Skip to main content

Enabling SAML Single Sign-On (SSO)

How to enable SAML Single Sign-On (SSO) in Re-Leased — configure your Identity Provider connection, set sign-on mode, enable auto-provisioning, and share ACS/Audience URI details with your IT team.

Updated over a week ago

SAML Single Sign-On (SSO) lets users access Re-Leased using their corporate credentials via your company's Identity Provider (IdP), such as Active Directory or LDAP — eliminating repeated sign-ins.


Prerequisites

  • SSO is included in your Re-Leased plan (contact the sales team if unsure).

  • Your company operates a SAML server for user authentication (on-premise or cloud).

  • All traffic to Re-Leased is secured via HTTPS.

  • You have: your SAML server's remote login URL, and the SHA2 fingerprint of the SAML certificate.


How to Configure SAML SSO

  1. Log in to Re-Leased with Administrator privileges.

  2. Navigate to Settings > Manage Single Sign On.

  3. Set SAML Sign-on mode to Enabled. (Selecting Enforced makes SSO the only login method.)

  4. Enter your IdP's remote login URL in the Sign-on URL field.

  5. Enter the SAML certificate fingerprint in the SAML Public Key field.

  6. Optionally, specify Auto-provisioning domains to automatically create accounts for users with matching email domains.

  7. If using auto-provisioning, confirm attribute mapping for user first and last names.

  8. Note the Audience URI, ACS URL, and Sign-on URL provided by Re-Leased, and share these with your IT team for IdP configuration.

  9. Click Save.

For Azure AD users, see the Configuring SSO with Azure AD guide.

Did this answer your question?