Configure SAML 2.0 single sign-on to allow your team to access Zenovay using your organization's identity provider.
Supported Identity Providers
| Provider | Status |
|---|---|
| Okta | Fully Supported |
| Microsoft Entra ID (Azure AD) | Fully Supported |
| OneLogin | Fully Supported |
| Google Workspace | Fully Supported |
| Ping Identity | Fully Supported |
| ADFS | Fully Supported |
| Custom SAML 2.0 | Supported |
Prerequisites
Before starting:
- Scale or Enterprise plan activated
- Admin access to your identity provider
- Owner or Admin access to Zenovay
- Your organization's email domain verified
Zenovay SAML Information
Service Provider Details
You will need these values when configuring the SAML application in your identity provider:
| Setting | Value |
|---|---|
| SP Entity ID / Audience URI | https://auth.zenovay.com |
| ACS URL (Assertion Consumer Service) | https://auth.zenovay.com/api/sso/saml/callback |
| NameID Format | urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress |
| Binding | HTTP-POST |
The SP Entity ID must be exactly https://auth.zenovay.com — do not add a trailing slash or path. The ACS URL must include the full path.
Getting Your Values
- Go to Settings → Authentication → SSO
- Click Add SSO Provider
- Select SAML 2.0
- The Zenovay SP values are listed above — copy them into your IdP
Okta Configuration
Step 1: Create Okta Application
- Log in to Okta Admin Console
- Go to Applications → Applications
- Click Create App Integration
- Select SAML 2.0
- Click Next
Step 2: Configure SAML Settings
General Settings:
- App name:
Zenovay - App logo: Upload Zenovay logo (optional)
SAML Settings:
| Okta Field | Value |
|---|---|
| Single sign-on URL | https://auth.zenovay.com/api/sso/saml/callback |
| Audience URI (SP Entity ID) | https://auth.zenovay.com |
| Name ID format | EmailAddress |
| Application username |
Step 3: Attribute Statements
Add these attribute mappings:
| Name | Value |
|---|---|
| user.email | |
| firstName | user.firstName |
| lastName | user.lastName |
Step 4: Get IdP Values
- Go to the Sign On tab
- Click View SAML setup instructions or Identity Provider metadata
- Note the following:
- IdP Entity ID (Issuer)
- IdP SSO URL (Login URL)
- Download the X.509 Certificate
Step 5: Complete in Zenovay
- Go to Settings → Authentication → SSO
- Click Add SSO Provider and select SAML 2.0
- Enter:
- Name: e.g., "Okta"
- Entity ID: the IdP Entity ID from Step 4
- SSO URL: the IdP SSO URL from Step 4
- Certificate: paste the full X.509 certificate
- Click Save
- Add and verify your email domain
- Test the connection
Microsoft Entra ID Configuration
Step 1: Create Enterprise Application
- Sign in to the Microsoft Entra admin center
- Go to Identity → Applications → Enterprise applications
- Click New application
- Click Create your own application
- Name:
Zenovay - Select Integrate any other application you don't find in the gallery
Step 2: Set Up Single Sign-On
- Click Single sign-on in the sidebar
- Select SAML
- Edit Basic SAML Configuration:
| Entra ID Field | Value |
|---|---|
| Identifier (Entity ID) | https://auth.zenovay.com |
| Reply URL (ACS URL) | https://auth.zenovay.com/api/sso/saml/callback |
Step 3: Configure Attributes
Edit Attributes & Claims:
| Claim Name | Source Attribute |
|---|---|
| emailaddress | user.mail |
| givenname | user.givenname |
| surname | user.surname |
Ensure the NameID claim format is set to Email address.
Step 4: Download Certificate and Get IdP Values
- Scroll to SAML Signing Certificate and download Certificate (Base64)
- In the Set up Zenovay section, copy:
- Microsoft Entra Identifier — this is your IdP Entity ID
- Login URL — this is your SSO URL
Step 5: Assign Users
- Go to Users and groups
- Add users or groups
- Save assignments
Step 6: Complete in Zenovay
- Go to Settings → Authentication → SSO
- Click Add SSO Provider and select SAML 2.0
- Enter:
- Name: e.g., "Microsoft Entra ID"
- Entity ID: the Microsoft Entra Identifier from Step 4
- SSO URL: the Login URL from Step 4
- Certificate: paste the contents of the downloaded Base64 certificate
- Click Save
- Add and verify your email domain
- Test the connection
Google Workspace Configuration
Step 1: Add Custom SAML App
- Go to Google Admin Console
- Go to Apps → Web and mobile apps
- Click Add App → Add custom SAML app
Step 2: Enter Details
App details:
- App name:
Zenovay - Description: Analytics platform
- App icon: Upload (optional)
Step 3: Download IdP Metadata
- Copy or download the SSO URL and Entity ID
- Download the Certificate
- Click Continue
Step 4: Service Provider Details
| Google Admin Field | Value |
|---|---|
| ACS URL | https://auth.zenovay.com/api/sso/saml/callback |
| Entity ID | https://auth.zenovay.com |
| Name ID format | |
| Name ID | Basic Information > Primary email |
Step 5: Attribute Mapping
| Google Directory | App Attribute |
|---|---|
| Primary email | |
| First name | firstName |
| Last name | lastName |
Step 6: Enable for Users
- Click on the app
- Go to User access section
- Turn ON for your organization or specific organizational units
Changes may take up to 24 hours to propagate in Google Workspace.
Step 7: Complete in Zenovay
- Go to Settings → Authentication → SSO
- Click Add SSO Provider and select SAML 2.0
- Enter the IdP Entity ID, SSO URL, and Certificate from Step 3
- Click Save
- Add and verify your email domain
- Test the connection
OneLogin Configuration
Step 1: Add Application
- Go to OneLogin Admin
- Go to Applications → Add App
- Search SAML Custom Connector (Advanced)
- Add
Step 2: Configuration Tab
| OneLogin Field | Value |
|---|---|
| Audience (EntityID) | https://auth.zenovay.com |
| Recipient | https://auth.zenovay.com/api/sso/saml/callback |
| ACS (Consumer) URL | https://auth.zenovay.com/api/sso/saml/callback |
Step 3: Parameters
Add parameters:
| Field | Value |
|---|---|
| firstName | First Name |
| lastName | Last Name |
Step 4: SSO Tab
Note the following values:
- SAML 2.0 Endpoint (HTTP)
- Issuer URL
- Download the X.509 Certificate
Step 5: Complete in Zenovay
- Go to Settings → Authentication → SSO
- Click Add SSO Provider and select SAML 2.0
- Enter the IdP values from Step 4
- Click Save
- Add and verify your email domain
Completing Setup in Zenovay
Add SSO Provider
- Go to Settings → Authentication → SSO
- Click Add SSO Provider
- Select SAML 2.0
- Enter the following values from your identity provider:
| Field | Description |
|---|---|
| Name | A friendly name for this provider (e.g., "Corporate Okta") |
| Entity ID | The IdP Entity ID / Issuer from your identity provider |
| SSO URL | The IdP Login URL / SSO Endpoint |
| Certificate | The X.509 signing certificate (paste full PEM including BEGIN/END lines) |
- Click Save
Verify Domain
After saving, add and verify your email domain:
- Click Add Domain
- Enter your email domain (e.g.,
company.com) - Follow the DNS verification steps
- Once verified, users with that domain will be directed to SSO
Test Connection
- Open an incognito/private browser window
- Go to auth.zenovay.com
- Enter an email from your verified domain
- Authenticate with your IdP
- Verify successful return to the Zenovay dashboard
Enable SSO
After successful test:
- Toggle Enforce SSO to on
- Choose enforcement level:
- Optional: users can choose SSO or password login
- Required: all users must use SSO
- Save
Before enforcing SSO, ensure at least one Owner account can still sign in via email/password as a backup in case of an IdP outage.
User Provisioning
Just-In-Time (JIT) Provisioning
New users are automatically created on first SSO login:
- Automatic account creation
- Default role assigned (Viewer)
- No invitation needed
Troubleshooting
Common Issues
| Issue | Solution |
|---|---|
| "Signature verification failed" | Re-download the IdP certificate and update it in Zenovay |
| "Digest mismatch" | Ensure the correct signing certificate is configured |
| "User not found" | The user's email must match the verified domain |
| "ACS URL mismatch" | Ensure ACS URL is exactly https://auth.zenovay.com/api/sso/saml/callback |
| "Entity ID mismatch" | Ensure Entity ID is exactly https://auth.zenovay.com |
| "NameID not found" | Set NameID format to EmailAddress in your IdP |
Certificate Expiration
IdP certificates expire — plan ahead:
- Monitor expiration dates in your IdP
- Download the new certificate before expiration
- Edit the SSO provider in Zenovay and replace the certificate
- Test the connection with the new certificate
Security Best Practices
Certificate Management
- Monitor expiration dates
- Use SHA-256 signing
- Update certificates before they expire
Attribute Security
- Only request needed attributes
- Verify attribute mappings
- Monitor for changes
Access Control
- Assign specific users/groups in your IdP
- Review access regularly
- Use conditional access policies