SSO using SAML
Integrate your SAML identity provider with Arcade
This is an Enterprise plan feature
Overview
Single sign-on (SSO) allows your team members to sign in to Arcade using your own identity provider, e.g. with Auth0, Okta, or Jumpcloud.
Arcade currently supports SP-initiated SSO using SAML 2.0.
Configuring SAML for your Arcade team
There are two parts to configuring SAML to work with Arcade:
Define a new SSO app in your IdP. These are the two main things you'll need when registering Arcade as an SSO app:
Entity ID: urn:app.arcade.software
ACS URL (sometimes referred to as the callback URL): https://app.arcade.software/__/auth/handler
Arcade registers your new SSO app as a SAML provider. We'll need the following information -- all of these are included in the SAML metadata XML document or URL:
Entity ID (also known as issuer)
SSO login URL
X509 Certificate
Once you've registered the new Arcade SSO app in your IdP, contact us at support@arcade.software with your SAML metadata URL (or attach the SAML metadata XML file or provide us the information above).
Finally, on your identity provider side, you need to allow the following callback URL:
We'll give you a unique Arcade SSO URL that you can use to sign in.
Configuring SAML on Auth0
See also: Auth0: Manually configure SSO integrations.
⚠️ Note about the SAML 2.0 add-on
On Auth0, you also have the option to configure SAML using the SAML 2.0 add-on.
If you configure Arcade SSO using that add-on, make sure that the SAML NameID
is set to the user email address, by configuring nameIdentifierProbes
like this in the add-on settngs:
Configuring SAML on Okta
See also: Okta: Create SAML app integrations.
Last updated