Integration Gateway Setup
This article aims to guide the user through how to set up SAML SSO in Integration Gateway.
Before continuing, this user should be a Integration Gateway administrator for the target environment.
Create a SAML Config
Log into Integration Gateway and navigate to the Admin site.
Scroll to the SAML SINGLE SIGN ON section, locate SAML Configs and click Add.

On the web form that displays, scroll to the bottom (without changing any values) and click SAVE.

Default SAML settings are considered secure and should suffice for most use cases. If SSO customization is desired, please see this article:
Integration Gateway SAML Config ReferenceNote that on the resulting page, there is now a URL and a download link for Integration Gateway's SAML metadata:

Provide the URL or metadata file to the IdP admin, who now must add Integration Gateway on their end as an external SSO application (aka Service Provider) and supply their IdP SAML metadata.
General IdP Setup
Create a new Service Provider (aka SSO Application, External Application, SSO Integration, SAML Application, etc. or something similar).
Upload the Integration Gateway metadata. Some IdPs won't support uploading a file, and will prefer a URL or even for the data to be copied and pasted.
Configure as necessary, add users, map user attributes, etc.
Save/activate/enable the new SSO application.
There should now be SAML metadata available which should be provided back to the Integration Gateway admin.
IdP-specific setup instructions
JumpCloud SetupOkta SetupAzure SetupAdd the IdP to Integration Gateway as a trusted authenticator
Before continuing, Integration Gateway should be configured and active in the IdP, and the IdP's SAML metadata should be available.
On the Admin site, under SAML SINGLE SIGN ON, locate SAML Identity Providers and click +Add.
Provide a name, optionally a logo image, and the metadata.

Click SAVE. Integration Gateway should now allow users to log in via this provider.
Testing connectivity
Log out of Integration Gateway and go to the main page. The login dialog should have a new section, Single Sign On, and the added IdP’s name should appear on a button.
Clicking the button should redirect the user to the IdP login page. After successful authentication, the user should be redirected back to Integration Gateway, bypassing the login screen and going right to the requested page.
If the user encounters a 403 Access Denied error after authenticating, this means Integration Gateway was unable to locate a user based on the information provided by the IdP. This is most likely due to one of the following issues:
The user in Integration Gateway is not active or doesn't exist.
The user’s email address in Integration Gateway does not match exactly to the email address at the IdP.
The IdP has not been properly configured to include the user email address in the information it submits to Integration Gateway for SSO.
The name of the email address user attribute is different between Integration Gateway and the IdP. This can be solved by adding an attribute mapping on the SAML Config page. Some IdPs also have this optionality on their end. See Integration Gateway SAML Config Reference
Last updated
Was this helpful?