Enterprise Connections Setup
Enterprise connections let organizations federate authentication through their existing identity providers using SAML 2.0 or LDAP. This guide covers the setup process in the AuthAction dashboard.
Overview
Section titled “Overview”To enable enterprise login:
- Configure your identity provider (IdP) to trust AuthAction as a service provider (for SAML), or prepare LDAP connectivity (for Active Directory / LDAP).
- Add the provider in AuthAction under Connections > Enterprise Connections.
- Enable the connection for your applications.
General SAML setup steps
Section titled “General SAML setup steps”For each SAML provider:
- Create a SAML application in your IdP’s admin console.
- Set the ACS (Assertion Consumer Service) URL to:
https://<tenant-name>.<region>.authaction.com/oauth2/saml/callback
- Copy the IdP SSO URL and Entity ID from your IdP.
- Configure in AuthAction: Go to Connections > Enterprise Connections, select the provider, and enter the details.
- Optionally upload the IdP certificate for signature verification.
- Enable for your app: In your application settings, enable the enterprise connection.
- Test by visiting your app’s login page and using the enterprise login button.
Supported providers
Section titled “Supported providers”See the Enterprise Connections section for provider-specific guides:
- Generic SAML
- Okta Workforce
- Google Workspace
- Microsoft Azure AD
- ADFS
- PingFederate
- JumpCloud
- Active Directory / LDAP
SP (Service Provider) metadata
Section titled “SP (Service Provider) metadata”For SAML-based connections, AuthAction acts as the Service Provider. Use the following values when configuring your IdP:
| Field | Value |
|---|---|
| ACS URL | https://<tenant-name>.<region>.authaction.com/oauth2/saml/callback |
| SP Entity ID | Your tenant URL (e.g. https://<tenant-name>.<region>.authaction.com) |
| Name ID Format | urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress |
Related
Section titled “Related”- Applications: Enable enterprise connections for your apps.
- Social Connections: Add social login providers alongside enterprise SSO.
- Custom Domains: Use a branded domain for enterprise login pages.