Setting up SAML SSO

Who can use this feature

  • Supported on Team and Enterprise plans
  • Note: Team plans are limited to Okta and Google SAML only
  • Anyone with an org admin role can access and edit Single sign-on

What's in this article:


Before setting up SSO, email our support team to add domains to your SSO approved list

Configuring single sign-on

You can configure SSO between Writer and your identity provider from the Admin Panel> Single sign-on page.

Select your IdP (Identity Provider)

Writer actively supports single sign-on with Okta, Google, and Azure. However, you can also set up single sign-on with other identity providers as well. If you’re using another identity provider, select Other IdPs

Head to your identity provider (e.g., Okta) to complete configuration.

Section A: From Writer into your IdP

If you look at Box A, you’ll see 2 fields that you’ll need to paste into your IdP (SP SSO URL and SP Entity ID). Note that these fields are sometimes called other names, depending on the IdP. 

Identity providers sometimes use different terminology for these fields
  • SP SSO URL is sometimes known as ACS (Assertion Consumer Service) URL or Recipient
  • SP Entity ID is sometimes known as an Audience URL.
  • Some IdPs may ask you to upload a metadata XML file from Writer. This is rare, but if you need this, select Advanced configuration, then select the download icon to download this XML. You can then upload this into your IdP.

    Section B: From your IdP into Writer

    Almost all IdPS will provide a SAML metadata XML. This is required from Writer to complete configuration. Once you have the XML from your IdP, upload it in Section B. We’ll analyze this XML and auto-populate the IdP Issuer and IdP SSO URL fields.

    Once we have your IdP’s XML uploaded, you can select Done to finish setup.

    Single sign-on settings

    After setup, you can still edit your configuration (e.g., to add another email domain). If you’re switching IdPs, you can remove your configuration and create a new one. 

    You’ll also have two advanced options.

    Allow uninvited users to create an account via SAML SSO

    If enabled, any user whose email address matches one of your domains can join your organization by signing in with SAML SSO. If you enable this option, you'll need to select a default team for these users.

    Allow team members to create passwords and sign in without SSO

    If enabled, users from your organization can create their own password and sign in without SAML SSO. 

    Tip: If you’d like to disable this setting, we recommend holding off until you’ve fully tested your SSO setup. Otherwise, you might block all users, including admins, if there's an error in your configuration. 

    FAQs

    General

    Q: Does your application support SAML 2.0 authentication?

    Yes.

    Q: Does your application support OIDC authentication?

    No.

    Q: Does your application provide SAML SP metadata?

    Yes, it can be found under advanced configuration on the single sign-on settings page. (Here's a link for admins.) Once you've selected an identity provider, this metadata will be displayed:

    Q: What is the SAML Single Sign On URL (ACS URL, Recipient)?

    https://app.writer.com/api/access/saml
    

    Q: What is the SAML SP Entity ID (Audience)?

    This is found on the single sign-on settings page once an identity provider is selected. For most accounts, this will be app.writer.com though some accounts may see app.writer.com/api/access/saml.

    Q: What SAML binding do you support?

    HTTP POST

    Q: What is the default SAML relay state?

    We don't enforce a default value. This can be empty.

    Q: What SAML NameID formats do you support?

    emailAddress or any other format if the email profile attribute is defined.

    Q: What Identity Providers have you previously integrated with successfully?

    Azure, GSuite, Okta, OneLogin, PingIdentity.

    Q: Can user permissions or roles be assigned based on SAML assertion?

    Yes, roles can be modified in the single sign-on settings page.

    Q: What additional profile attributes, if any, are you expecting in the assertion/claim from SAML IdP?

    first_name, family_name, picture_url

    Q: Do you require encrypted assertions?

    No.

    Q: Do you require encrypted name identifiers?

    No.

    Q: Do you support Service Provider Initiated SSO, Identity Provider Initiated SSO, or both?

    Both.

    Q: Do you support "deep linking" and if yes, how do you offer this?

    No.

    Q: Do you support JIT or OOB user provisioning?

    Both.

    Q: If OOB user provisioning is required, what methods do you support?

    SCIM.

    Q: Do you have a non-prod environment we could connect to?

    No.

    Q: Can the application be configured to remove users who have not logged in for a specific period of time?

    No.

    Error messages

    Q: When I add my email domain and select Next, I’m getting an error that says “One or more of the domains you added are already registered by another organization.”

    Email domains that you add to single sign-on have to be completely unique. It’s possible that someone else from your organization has already set up another Writer account. To resolve this, email support@writer.com and we’ll help you sort it out.

    Q: When I add my IdP metadata XML and select done, I’m getting an error that says “Your IdP configuration failed: Identity provider with same entity id is already registered!”

    Your IdP metadata has to be completely unique. It’s possible that someone else from your organization has already set up another Writer account. To resolve this, email support@writer.com
    Did this answer your question? Thanks for the feedback There was a problem submitting your feedback. Please try again later.

    Still need help? Contact Support Contact Support