Softr Docs
Single Sign-On Configuration (SAML)
How to set up Single Sign-On for your Softr app
In this section, we'll go through the steps of setting up SAML (Security Assertion Markup Language) for your Softr app. SAML is an open standard that allows identity providers (IdP) to pass authorization credentials to service providers (SP), so that users can use a single set of credentials to log into different SPs. In this case your Softr app is the SP, and you need to connect it to an IdP to implement Single Sign-On (SSO) on your Softr app. There are several IdP services (e.g. Azure, Okta, Box) that you can use, but here we'll demonstrate the setup flow using OneLogin. So, let's start.

Creating an Application on IdP

From the OneLogin dashboard, we are going to navigate to Applications and click Add App.
Adding an application
In the list that opens next, search for "saml test connector," select it, and create the application.
SAML Test Connector

Configuring the Application

In the Application settings, we are going to navigate to Configuration and fill in the following fields:
  • Audience (EntityID)
  • Recipient
  • ACS (Consumer) URL Validator
  • ACS (Consumer) URL
To do this, you need to navigate to your Softr app's Settings => SAML Integration. From there, copy the ACS URL and paste into Recipient and ACS (Consumer) URL* fields as well as copy the Audience URL and paste into the Audience (EntityID) field. In the ACS (Consumer) URL Validator field, just add ".*".
SAML Settings in your Softr app
So, the ACS URL is basically your application SAML URL, while the Audience URL is a unique identifier that allows the IdP to identify the SP. Eventually, your setup should look similar to what's shown below.
Configuration section setup

Configuring Application Parameters

As soon as you're done with the Configuration section, navigate to application's Parameters, where you need to create the Email, First Name, and Last Name fields. In the pop-up that opens after clicking the Create button, you need to add the field name (can be anything) and check the Include in SAML assertion flag.
New Field
Then hit Save and choose the field's value ("Email," "First Name," or "Last Name" depending on which one you're configuring).
Field's Value
In the screenshot below, we already have all the three fields added.
Field added

Getting the Metadata XML

Further on, navigate to the SSO section and copy the Issuer URL. As soon as you paste it in the browser address bar, it will download a metadata XML file, which we are going to use in the next step.
Issuer URL

Configuring Single Sign-On in Your Softr App

Now that you have everything ready, go to your Softr app's SAML Settings and fill in the Metadata.xml field with the XML you downloaded in the previous steps and the key fields with the names of the fields we defined earlier.
SAML Settings Configured

Adding the Single Sign-On Block

That's it, you're all set and can now add the Single Sign-on block from Blocks => User Accounts to allow your users to log in with their IdP (in this case OneLogin) credentials.
Single Sign-On block
You can customize the Logo, Title, Page after signin, and other settings and publish your app. Now, all the users that have an account on your OneLogin application, will be able to log in to your Softr app, and a user will be created for them. See below.
Logging in with OneLogin account
Copy link
Creating an Application on IdP
Configuring the Application
Configuring Application Parameters
Getting the Metadata XML
Configuring Single Sign-On in Your Softr App
Adding the Single Sign-On Block