SAML SSO Setup Guide for Coreo
1. Prerequisites
Before setting up SAML SSO, ensure the following:
- You have an active Coreo Enterprise account
- Your organization uses a SAML 2.0-compliant Identity Provider (IdP) such as Azure AD, Okta, Google Workspace, OneLogin, or ADFS.
- You have access to your IdP’s configuration dashboard.
2. SAML Configuration Steps
Azure/Microsoft Entra ID
Step 1: Create the SAML application in your Identity Provider:
- Navigate to Microsoft Entra ID in your Azure dashboard
- Add a new Enterprise application
- Create your own application
- Give the name of the application to be “Coreo”
- Select the option “Integrate any other application you don’t find in the gallery (Non-gallery)”
- Create the application
Step 2: Set up application Single Sign-on (SSO)
- Navigate to the create enterprise application
- Set up single sign on
- Select the option to be SAML Single Sign-on method
- Enter the basic SAML configuration for Coreo:
- Identifier (Entity ID):
https://api.coreo.io
- Reply URL (Assertion Consumer Service URL):
https://api.coreo.io/auth/saml/callback?domain=<DOMAIN>
(DOMAIN will need to be provided by Coreo during setup)
- Identifier (Entity ID):
- Setup Attributes & Claims
- Add a new additional claim for “firstName”
- Add name to be “firstName”
- Select Source to be “Attribute”
- Select the source attribute to be “user.givenname”
- Add a new additional claim for “lastName”
- Add name to be “lastName”
- Select Source to be “Attribute”
- Select the source attribute to be “user.surname”
- Add a new additional claim for “firstName”
Step 3: Assign Users in Your IdP
- Assign users who should have access to Coreo
- Ensure their email addresses match their accounts in Coreo
Step 4: Gather Required Information
You will need the following details from your Identity Provider to provide to Natural Apptitude:
- Microsoft Entra Identifier
- SSO Login URL
- Signing Certificate (Base64)
Was this article helpful?
Thanks for your feedback!