SAML Single Sign-On (SSO) lets users access Re-Leased using their corporate credentials via your company's Identity Provider (IdP), such as Active Directory or LDAP — eliminating repeated sign-ins.
Prerequisites
SSO is included in your Re-Leased plan (contact the sales team if unsure).
Your company operates a SAML server for user authentication (on-premise or cloud).
All traffic to Re-Leased is secured via HTTPS.
You have: your SAML server's remote login URL, and the SHA2 fingerprint of the SAML certificate.
How to Configure SAML SSO
Log in to Re-Leased with Administrator privileges.
Navigate to Settings > Manage Single Sign On.
Set SAML Sign-on mode to Enabled. (Selecting Enforced makes SSO the only login method.)
Enter your IdP's remote login URL in the Sign-on URL field.
Enter the SAML certificate fingerprint in the SAML Public Key field.
Optionally, specify Auto-provisioning domains to automatically create accounts for users with matching email domains.
If using auto-provisioning, confirm attribute mapping for user first and last names.
Note the Audience URI, ACS URL, and Sign-on URL provided by Re-Leased, and share these with your IT team for IdP configuration.
Click Save.
For Azure AD users, see the Configuring SSO with Azure AD guide.