SAML SSO
Single Sign-On (SSO) with SAML provides secure authentication for your team members.
SAML SSO
Single Sign-On (SSO) with SAML provides secure authentication for your team members using your existing identity provider.
What is SAML SSO?
SAML (Security Assertion Markup Language) SSO allows your team members to authenticate using your organization's existing identity provider (IdP) instead of managing separate passwords for ManySends.
One login for all applications
Enterprise-grade authentication
No multiple passwords to remember
Sync users from your IdP
Supported Identity Providers
Azure Active Directory
Microsoft's cloud identity solution
Okta
Enterprise identity management
Google Workspace
Google's productivity suite
OneLogin
Cloud-based identity management
Auth0
Identity platform for developers
Any SAML 2.0 IdP
Compatible with any SAML provider
Setting Up SAML SSO
Enable SAML SSO
Go to Settings → Security → SAML SSO and enable the feature.
Settings → Security → SAML SSO
Configure Identity Provider
Enter your IdP configuration details:
SSO URL
The single sign-on URL from your IdP
Issuer URL
The entity ID from your IdP
Certificate
The X.509 certificate from your IdP
Configure Service Provider
ManySends will provide you with:
ACS URL
Assertion Consumer Service URL
Entity ID
ManySends service provider identifier
Metadata
XML metadata file for your IdP
Test Configuration
Test the SAML connection to ensure proper authentication flow.
Success: Test login should redirect to your IdP and back to ManySends
Map User Attributes
Configure how user attributes from your IdP map to ManySends user fields:
User's email address
Name
User's full name
Role
User's role in ManySends
User Authentication Flow
- 1User navigates to ManySends login page
- 2User clicks "Login with SSO"
- 3User is redirected to your IdP
- 4User authenticates with your IdP
- 5IdP sends SAML assertion to ManySends
- 6ManySends validates assertion and logs user in
Security Features
Encryption
- • SAML assertions are encrypted
- • Secure communication between IdP and SP
- • Certificate-based authentication
Session Management
- • Automatic logout when IdP session ends
- • Session timeout configuration
- • Multi-factor authentication support
Troubleshooting
Certificate mismatch
Ensure certificates are up to date and properly formatted.
Clock skew
Synchronize server clocks between IdP and SP.
URL configuration
Verify all URLs are correct and accessible.
Attribute mapping
Check attribute names match between IdP and ManySends.
Compliance
SAML SSO helps with:
Still need help?
Can't find the answer you're looking for? Our support team is here to help.