SAML
This documentation will describe the process of integrating a SAML application with Port, along with some examples for specific identity providers.
In order to integrate Port with a SAML SSO application, you will need to do the following:
- Create a new SAML application in your identity provider.
- Share with us the following information about your SSO application: X509 certificate (
.pemfile) and Signin URL (as defined in the application). - Port will provide you with a metadata XML file that you can upload in the SAML application to complete the connection.
- Update the application with the following attributes (Port expects the IdP to send the following attributes and their values in the authentication request, for example:
firstnameis the attribute in the IdP provider, andgiven_nameis the key Port expects to receive that data in the authorization mapping):- User attribute mappings -
target attribute name (Port):source attribute name (SSO app):email:emailgiven_name:firstnamefamily_name:lastname
- Constant attributes:
email_verified:true
- User attribute mappings -
If your login provider does not support metadata files, use the following information:
- IdP EntityID:
https://auth.getport.io - SP EntityID: The EntityDescriptor field in the XML, looks like :
urn:auth0:port-prod:{CONNECTION_NAME}where the{CONNECTION_NAME}is the connection name as provided to you by Port. - callback URL: The AssertionConsumerService binding field in the XML, looks like:
https://auth.getport.io/login/callback?connection={CONNECTION_NAME}where the{CONNECTION_NAME}is the connection name as provided to you by Port.
📄️ Microsoft Entra ID (AzureAD)
Integrate Entra ID (AzureAD) with Port using SAML
📄️ Okta (SAML)
Integrate Okta with Port using SAML
📄️ JumpCloud
Integrate JumpCloud with Port using SAML
📄️ Google Workspace
Integrate Google Workspace with Port using SAML