Skip to main content

SAML - Article

Enable secure SAML 2.0 single sign-on in Eurekos, allowing centralized authentication, automatic user provisioning, and seamless access control through your organization’s identity provider.
Updated: 4 Apr 2026
22 min read

Summary

Connect Eurekos with an external identity provider using SAML 2.0 to enable secure single sign-on (SSO), centralized user management, and automated user provisioning across the platform.

In this article you will learn:

  • How SAML integrates with Eurekos for authentication and provisioning
  • How user data is synchronized and governed through an identity provider
  • How login behavior and access control are managed
  • How to configure and validate the integration step-by-step
  • How SAML supports security, scalability, and user lifecycle management

Business Context

In many organizations, user identity is already managed centrally through systems such as Microsoft Entra ID (Azure AD), Okta, or OneLogin. These systems define who users are, how they authenticate, and what they are allowed to access.

The SAML integration allows Eurekos to plug directly into this ecosystem.

Instead of creating and managing users manually inside Eurekos, the platform relies on the organization’s Identity Provider (IdP) as the single source of truth. This fundamentally changes how users are handled:

  • Users do not need separate Eurekos credentials
  • Authentication follows existing company policies (including MFA/2FA)
  • User data is automatically provisioned and maintained
  • Access is controlled externally

A practical example:

A new employee joins your organization and is created in Azure AD. When they access Eurekos for the first time, their account is automatically created with the correct name, email, and organizational structure—without any manual setup.

When a user is disabled or removed from the Identity Provider, they immediately lose access to Eurekos.

This removes the need for manual deactivation and ensures alignment with corporate security and compliance requirements.

Feature Overview

The SAML integration transforms Eurekos from a standalone authentication system into a connected application within your identity infrastructure.

From an administrator perspective, the integration enables three key capabilities:

1. Authentication through SSO Users log in using their existing corporate credentials:

  • No additional passwords to manage
  • Seamless login experience
  • Built-in support for enterprise security policies

2. Automated User Provisioning When a user logs in for the first time:

  • Eurekos checks whether the user already exists
  • If not, a new user account is created automatically (if enabled)
  • Profile data is populated using attributes from the Identity Provider

This is often referred to as just-in-time provisioning.

3. Ongoing Data Synchronization User data can be kept aligned with the Identity Provider.

For example:

  • Department changes
  • Manager updates
  • Organizational structure changes

These updates automatically flow into Eurekos on login, ensuring that reporting and access structures remain aligned with the organization while minimizing administrative overhead.

How the Integration Works

At a high level, the integration follows a simple but powerful sequence.

When a user clicks “Log in”:

  1. User is redirected to the Identity Provider
  2. Authentication is performed by the IdP (including MFA or conditional access policies)
  3. A secure SAML assertion is returned to Eurekos containing identity data
  4. Eurekos processes the user:
    • Creates the user (if new)
    • Updates profile data (if configured)
    • Grants access to the platform

Eurekos does not validate passwords or manage authentication security. Instead:

  • The Identity Provider handles authentication
  • Eurekos focuses on user context and learning experience

This separation is key to scalability and security.

Login Experience and Behavior

Once configured, SAML becomes part of the Eurekos login experience and can be adapted to different user groups and access models.

Users may see SSO as a login option alongside other methods such as email/password, depending on how the login form is configured. Administrators control this behavior in Settings → Forms → Login.

Here, you can define:

  • Which login methods are primary or secondary
  • Whether SSO is visible or hidden
  • How login options are presented to users

Multiple identity providers can be supported simultaneously, allowing flexibility across different user groups or organizational contexts.

This flexibility makes it possible to design login experiences that align with:

  • Fully centralized identity environments
  • Mixed audiences (internal and external users)
  • Controlled rollout or testing scenarios

💡 In a SAML-based setup, authentication is always performed by the Identity Provider, while Eurekos controls how users are directed into that authentication flow.

The following section outlines common login experience models and when to use them.

Login Experience Scenarios

Depending on how SAML and login settings are configured, different authentication experiences can be created in Eurekos. These configurations allow organizations to align login behavior with their user base, security requirements, and operational model.

Different login experience configurations in Eurekos, showing how SSO can be enforced, combined with local login, or selectively exposed depending on rollout strategy.
Different login experience configurations in Eurekos, showing how SSO can be enforced, combined with local login, or selectively exposed depending on rollout strategy.
ScenarioTypical Use CaseKey Characteristics
SSO-only environment
All users authenticate exclusively through the Identity Provider. The login process is fully centralized and controlled externally
Internal platforms where all users belong to the same organization and are managed in a central identity system (e.g. employees via Azure AD or a centralized partner portal)
  • Users are automatically redirected to the Identity Provider
  • No email/password login is visible
  • Authentication follows corporate policies (e.g. MFA)
  • User lifecycle is fully controlled externally
Hybrid environment
Both SSO and local login are available, allowing different user groups to authenticate using different methods
Platforms with mixed audiences, such as internal employees and external partners, customers, or learners
  • Internal users log in via SSO
  • External users log in via email/password
  • Supports gradual SSO rollout
  • Provides flexibility without enforcing a single login method
Hidden SSO 
SSO is enabled but not visible on the standard login screen. Access is provided through a direct login URL
Controlled access scenarios (funnels), also pilot groups, specific clients, or staged rollouts. Is sometimes used in combination with other scenarios
  • SSO option is hidden from general users
  • Accessible via direct URL
  • Can be used for testing or restricted audiences
  • Allows configuration without impacting all users

How To Choose the Right Approach

The appropriate setup depends on your organizational context:

  • Use SSO-only when all users are managed centrally and security policies must be enforced consistently
  • Use Hybrid when supporting multiple user types with different identity sources
  • Use Hidden SSO for controlled rollouts, testing, or segmented access strategies

💡 In practice, many organizations begin with a hybrid or hidden setup during implementation and transition to an SSO-only model once fully validated.

Existing Users, Login Behavior, and Transition to SSO

When SAML is introduced in an existing Eurekos environment, users may already have accounts created through email/password or manual administration.

Eurekos is designed to support a seamless transition to SSO without creating duplicate users or requiring manual migration.

Existing User Handling

When a user logs in via the Identity Provider for the first time:

  • Eurekos receives a SAML assertion containing the user’s identity
  • Eurekos attempts to match the incoming identity with an existing account
  • Matching is typically based on a unique identifier, most commonly the NameID (typically email) or another configured attribute
  • If a match is found, the existing account is reused and linked to the Identity Provider

This ensures that users retain:

  • Learning history
  • Enrollments and progress
  • Roles and permissions

No data is lost, and no duplicate accounts are created.

Login Behavior After SSO Is Introduced

Authentication behavior depends on how login options are configured.

If “Use regular login” is enabled:

  • Users can log in using both SSO and email/password
  • Users who authenticate via SSO may need to reset their password before using email/password login, as SSO accounts are assigned a system-generated password

If disabled:

  • Users are expected to log in exclusively via SSO
  • Authentication is fully delegated to the Identity Provider

What This Means in Practice

Organizations can introduce SSO gradually without disrupting existing users.

For example:

An organization enables SSO after months of platform usage. Existing users log in via SSO, their accounts are automatically recognized, and their data remains intact—while authentication shifts to the Identity Provider.

SAML authentication and provisioning flow showing how Eurekos delegates authentication to the Identity Provider, processes SAML assertions, and manages user creation, mapping, and synchronization.
SAML authentication and provisioning flow showing how Eurekos delegates authentication to the Identity Provider, processes SAML assertions, and manages user creation, mapping, and synchronization.

User Provisioning and Profile Mapping

One of the most important aspects of the integration is how user data is transferred, interpreted, and structured within Eurekos. When a user logs in via SAML, Eurekos receives a SAML assertion from the Identity Provider, which contains a set of user attributes within the assertion’s attribute statement.

These attributes must be mapped to the corresponding user profile fields in Eurekos to ensure that users are created correctly and that their data is usable for reporting, grouping, and access control.

In addition to attributes, the NameID element in the SAML assertion is typically used as the unique identifier for the user (most commonly the email address), and plays a key role in matching existing users.

For example:

Identity Provider AttributeEurekos Field
email / NameIDEmail (unique identifier)
given_nameFirst name
family_nameLast name
departmentDepartment
managerImmediate manager

This mapping determines:

  • How users are uniquely identified in the platform
  • How they appear across the user interface
  • How they are grouped, filtered, and reported on
  • How they align with organizational structure and governance

Profile Fields and Field Identifiers

The available fields in Eurekos are defined through the profile form configuration, which controls both the structure of user data and how it is presented in the platform.

For a complete overview of available fields and configuration options, refer to the Profile Forms configuration article.

Each field in Eurekos has:

  • A label (what users and administrators see)
  • A machine name (ID), which is used for integrations and attribute mapping

Even if a field label is renamed in the interface, the underlying machine name (ID) remains unchanged and must be used when mapping attributes from the Identity Provider.

In practice, this means:

  • The Identity Provider must send attributes that match the expected field IDs
  • Mapping must be aligned with the technical field identifiers, not just visible labels
  • Changes to field names in Eurekos do not affect integration behavior

For example:

  • A field labeled “Business Unit” in the UI may still have a machine name like department
  • The Identity Provider must continue to send department for the mapping to work correctly

Successful user provisioning depends on precise alignment between Identity Provider attributes and Eurekos field identifiers. The profile form configuration defines the structure, while the integration relies on the underlying field IDs to map and maintain user data correctly.

Handling Missing Data and Dynamic Structure

In identity integrations, user data is not always complete or consistent. Attributes may be missing, structured differently, or introduced over time as the organization evolves.

Because SAML assertions only contain the attributes explicitly configured in the Identity Provider, it is important to account for cases where expected values are not present.

To ensure stable provisioning, Eurekos supports both fallback handling and dynamic structure creation.

Handling Missing or Incomplete Data

Administrators can define:

  • Default values for required fields
  • Fallback logic when expected attributes are missing

This ensures that users can still be created and access the platform, even when data from the Identity Provider is incomplete.

For example:

  • If department is not provided → assign a default department
  • If notification scheme is missing → apply platform defaults

Dynamic Data Creation

In more advanced scenarios, the Identity Provider may supply structured data that does not yet exist in Eurekos, such as new departments, organizations, or tags.

Instead of requiring manual setup:

  • Eurekos can automatically create these entities during login
  • Users are assigned to the newly created structure immediately

For example:

  • A new department is introduced in the Identity Provider
  • A user logs in with that department
  • Eurekos creates and assigns the department automatically

Eurekos can adapt dynamically to identity data, allowing organizations to scale and evolve their structure without constant administrative maintenance.

Synchronization Behavior

Synchronization determines how user data evolves over time and, more importantly, which system is responsible for maintaining that data.

When integrating with an Identity Provider, organizations must decide whether Eurekos should act as a consumer of identity data or retain some level of local control over user profiles. This decision has a direct impact on governance, reporting accuracy, and administrative workload.

The two approaches can be compared as follows:

AspectOne-time provisioning (static)Continuous synchronization (dynamic)
Data lifecycleData is set once during initial loginData is updated on every login
Source of truthEurekos (after creation)Identity Provider
Updates from IdPNot reflected automaticallyAlways reflected on login
Profile editing in EurekosAllowedRestricted (read-only fields)
Administrative controlLocal control within EurekosCentralized control via IdP
Typical use caseFlexible environments where data may differ from IdPEnterprise environments with centralized identity governance
Risk/limitationData may become outdated over timeLess flexibility for local overrides

Practical example

Consider a user who moves from the Sales department to Marketing in the Identity Provider.

  • With one-time provisioning, the user remains assigned to Sales in Eurekos unless manually updated
  • With continuous synchronization, the change is applied automatically on the next login

As a result:

  • Reports reflect the correct department
  • Access and grouping remain aligned with the organization
  • No manual updates are required

💡 Choose one-time provisioning for flexibility and local control, or continuous synchronization for consistency, scalability, and alignment with your identity system.

Configuration

Configuring SAML 2.0 requires coordination between Eurekos administrators and the IT team managing the Identity Provider. The objective is not only to establish a trusted authentication relationship, but also to ensure that authentication, user provisioning, and data governance behave as expected in your organization.

In practice, this means configuring both systems so that authentication works seamlessly and user data is structured correctly from the first login onward.

Step 1: Configure Identity Provider

The setup begins in your Identity Provider (e.g. Microsoft Entra ID, Okta, OneLogin), where Eurekos must be registered as a SAML application.

At this stage, you define how Eurekos is identified and how authentication responses are delivered.

This typically involves:

  • Creating a SAML application / enterprise application
  • Defining the Entity ID (Audience URI), which uniquely identifies Eurekos as a service provider
  • Configuring the Assertion Consumer Service (ACS URL), which is the endpoint in Eurekos that receives the SAML response after authentication
  • Defining attribute mappings, which determine what user data is included in the SAML assertion
  • Configuring the NameID, typically set to email, which is used as the unique identifier for users

These attributes and identifiers are critical, as they are used to match users and populate profile data in Eurekos. If attributes are missing or inconsistently defined, user provisioning may fail or result in incomplete profiles.

💡 In most implementations, this step is handled by IT, but it should be aligned with how user data is expected to appear and behave in Eurekos.

Step 2: Configure Identity Provider in Eurekos

Once the Identity Provider is configured, the connection is completed in Eurekos.

Navigate to Settings → Third party integrations → SAML.

Start by defining a clear name (e.g. Company SSO) and keep the provider disabled during setup to avoid exposing incomplete configurations. It can also be hidden from the login page while testing.

You will then configure the trust relationship using:

  • Federation Metadata URL (preferred), which allows Eurekos to automatically retrieve configuration details from the Identity Provider
  • Alternatively, upload metadata XML manually if a URL is not available

This metadata contains:

  • Identity Provider endpoints
  • Signing certificates
  • Protocol configuration

You must also define:

  • Entity ID, which identifies Eurekos in the trust relationship
  • NameID policy, which determines how users are identified (typically email)

These settings define how Eurekos validates incoming SAML assertions and establishes trust with the Identity Provider.

At this stage, you are effectively defining:

Where authentication is performed and how Eurekos receives and validates identity information.

Step 3: Configure Attribute Mapping and User Provisioning

With the connection established, the focus shifts to how user data is interpreted and managed. This is the most important part of the setup, as it determines how users are created, structured, and maintained in Eurekos.

Each SAML assertion contains attributes defined in the Identity Provider. These attributes must be mapped to corresponding Eurekos user fields.

These fields are defined in the profile form configuration and rely on underlying field IDs (machine names) rather than visible labels.

For example, even if a field is labeled “Business Unit” in the interface, the mapping must use its original identifier (e.g. department).

In real-world setups, it is also common that some attributes are missing or not consistently populated. To handle this, you can define:

  • Default values for required fields
  • Fallback logic to ensure users can still be created

For example:

  • If no department is provided → assign a default value
  • If a referenced organization does not exist → create it automatically during login

This allows Eurekos to adapt dynamically to incoming identity data without requiring constant manual setup.

Step 4: Define Synchronization and Login Behavior

Next, you define how user data evolves over time and how users will authenticate.

You must decide whether:

  • Users should be created automatically on first login
  • User data should be synchronized on every login or only once

If synchronization is enabled, Eurekos continuously reflects the Identity Provider, and profile fields become read-only. If not, Eurekos allows local control after initial provisioning.

At the same time, you define login behavior:

  • If regular login is enabled, users can log in via both SSO and email/password (though SSO users may need to reset their password to use this option)
  • If disabled, authentication is fully delegated to the Identity Provider

This step is particularly important in real-world scenarios such as:

  • Gradual SSO rollout
  • Supporting both internal and external users
  • Transitioning from local accounts to centralized identity

Step 5: Configure Advanced Login Behavior

Advanced settings allow you to shape how authentication is presented to users and how Eurekos fits into your broader access and navigation flow. While authentication itself is handled by the Identity Provider, these options determine how users enter and exit that flow.

  • Auto-login can be used to automatically redirect users to the Identity Provider when accessing the login page. This creates a seamless SSO experience and is typically used in internal environments where all users are managed centrally.
  • Pre-login and post-logout redirects allow Eurekos to integrate into a wider ecosystem of applications. For example, users may access Eurekos from a company portal or learning hub, and after logging out, be redirected back to that environment. This helps maintain a consistent user journey across systems.
  • The Identity Provider can also be hidden or selectively exposed on the login screen. This is particularly useful during phased rollouts, testing, or when supporting multiple user groups with different authentication methods. Even when hidden, the Identity Provider can still be accessed via a direct login URL.

In practice, these settings are often used to:

  • Gradually introduce SSO without disrupting existing users
  • Support both internal and external audiences with different login flows
  • Embed Eurekos as part of a larger platform or portal experience

💡 These options do not change how authentication works, but they significantly influence how users experience it—making them especially important in implementations where user access and navigation span multiple systems.

Step 6: Test and Validate

Before enabling the integration for all users, it is essential to validate the full authentication and provisioning flow in realistic conditions. A successful SAML setup is not only about confirming that users can log in, but also about ensuring that identity data is interpreted correctly, existing accounts are handled safely, and the chosen login experience aligns with your organizational model.

As a first step, use Save and make test login to verify the technical connection. This allows you to:

  • Confirm that authentication completes successfully
  • Verify that the expected attributes are returned from the Identity Provider
  • Inspect whether mapped values correspond correctly to Eurekos user fields

This initial test should then be followed by scenario-based validation.

6.1 Validate authentication flow

Test that the basic login flow works as intended:

  • User is redirected to the Identity Provider
  • Authentication succeeds
  • User is returned to Eurekos without error
  • Login works from the intended entry point (standard login page, direct URL, or auto-login flow)

This confirms that the application registration, Entity ID, ACS URL, metadata, and certificates are configured correctly.

6.2 Validate new user provisioning

Test with a user who does not yet exist in Eurekos.

Verify that:

  • A new account is created automatically if Auto-create user is enabled
  • Required fields such as email, first name, and last name are populated correctly
  • Default values are applied where expected
  • Related entities such as organizations, tags, or suborganizations are handled correctly

This confirms that first-time provisioning behaves as intended and that the Identity Provider is supplying the required data.

6.3 Validate existing user linking

Test with a user who already exists in Eurekos before SSO is introduced.

Verify that:

  • The existing account is recognized and reused
  • No duplicate account is created
  • Existing progress, enrollments, and permissions remain intact
  • The user can transition to SSO without disruption

This is one of the most important rollout scenarios, especially in platforms with an established user base.

6.4 Validate attribute mapping

Review all mapped fields in the resulting user profile.

Verify that:

  • Each field receives the expected value from the Identity Provider
  • Renamed profile fields still map correctly through their machine names
  • Multi-value or structured attributes are interpreted correctly where applicable
  • No fields are left blank unexpectedly

If a value is incorrect or missing, the issue is usually either:

  • An attribute not being sent by the Identity Provider
  • A mismatch between IdP attribute name and Eurekos field mapping

6.5 Validate synchronization behavior

Test how user data behaves after the initial login.

If Synchronize user info on login is enabled, verify that:

  • Profile data updates when changed in the Identity Provider
  • Synchronized fields become read-only in Eurekos
  • Eurekos reflects the latest organizational structure on each login

If synchronization is disabled, verify that:

  • Initial data is populated correctly
  • Fields remain editable locally in Eurekos
  • Later changes in the Identity Provider do not overwrite local edits

This step is critical for confirming whether Eurekos or the Identity Provider is acting as the operational source of truth for user data.

6.6 Validate login behavior and visibility

Test the intended user experience on the login page.

Verify that:

  • The provider is shown or hidden as expected
  • Primary and secondary login methods are presented correctly
  • Auto-login behavior works only where intended
  • The reserve login page is available if needed for administrative fallback

This is especially important in hybrid or phased rollout models, where internal and external users may have different login paths.

6.7 Validate regular login behavior

If Use regular login is enabled, test how SSO and password login coexist.

Verify that:

  • Users can still use SSO successfully
  • Existing local users are not disrupted
  • Users who need password login understand that they may need to reset their password after transitioning to SSO
  • Password recovery and one-time login links behave as expected

This helps avoid confusion during rollout, particularly when introducing SSO into an existing platform.

6.8 Validate user lifecycle control

Test how access behaves when the user is changed in the Identity Provider.

For example:

  • Disable or remove the user in the Identity Provider
  • Attempt login to Eurekos again

Verify that:

  • The user can no longer authenticate
  • Access is effectively controlled by the Identity Provider
  • No manual deactivation in Eurekos is required to block login

This confirms that the integration supports centralized access governance as intended.

6.9 Validate with multiple test users

Where relevant, test more than one user scenario, for example:

  • A brand-new user
  • An existing user already in Eurekos
  • A user with complete profile attributes
  • A user with missing or partial data
  • A user in a different organization or department

This gives confidence that the integration works beyond a single ideal test case.

Recommended validation approach

For a reliable rollout:

  • Test in a non-production environment first
  • Start with a limited pilot group
  • Validate both technical connection and real user scenarios
  • Confirm behavior with both administrators and IT before wider release

A successful SAML implementation is not just about whether login works once. It should be validated as a complete identity flow, covering authentication, user creation, attribute mapping, synchronization, and access governance so that the platform behaves predictably from day one.

Validation Checklist

Use this checklist as a final validation step before rollout to ensure that both the technical connection and real-world user scenarios behave as expected.

AreaWhat to TestExpected Outcome
Authentication flowUser logs in via SSOUser is redirected to the Identity Provider, authenticates successfully, and returns to Eurekos without errors
Entity ID / ACS URLLogin roundtripNo mismatch errors; SAML response is accepted and user lands correctly in Eurekos
SAML assertion handlingAuthentication responseEurekos receives a valid, signed SAML assertion and processes it correctly
New user provisioningFirst-time login (new user)User is created automatically with correct profile data and default values applied where needed
Existing user linkingLogin with existing Eurekos userExisting account is reused; no duplicate user is created; data and progress remain intact
Attribute mappingReview user profile after loginAll mapped fields contain correct values based on IdP attributes; no unexpected empty or incorrect fields
Missing data handlingLogin with incomplete IdP dataDefault values are applied; user is still created successfully
Dynamic data creationLogin with new org/department valueMissing entities (e.g. department, organization) are created automatically if configured
Synchronization behaviorUpdate user data in IdP and log in againData updates correctly (if sync enabled) or remains unchanged (if disabled)
Read-only fieldsAttempt to edit synchronized fieldsFields are read-only when synchronization is enabled
Login experienceLogin page behaviorProvider is visible/hidden as configured; primary/secondary login methods behave correctly
Auto-loginAccess login pageUser is automatically redirected to the Identity Provider (if enabled)
Regular login fallbackUse email/password loginWorks as expected if enabled (note: SSO users may need password reset)
User lifecycle controlDisable user in IdPUser can no longer log in to Eurekos
Multiple user scenariosTest different user typesBehavior is consistent across new users, existing users, and users with varying attribute completeness

Run through this checklist after initial configuration and again before full rollout to ensure the integration behaves correctly across authentication, provisioning, synchronization, and access control.

Standards and Security Considerations

The SAML integration in Eurekos is based on SAML 2.0 (Security Assertion Markup Language), an industry-standard protocol for enterprise single sign-on maintained by OASIS. This ensures compatibility with enterprise identity providers such as Microsoft Entra ID, Okta, and OneLogin.

Standards and References

  • SAML 2.0 Core Specification (OASIS)
  • SAML 2.0 Bindings and Profiles
  • SAML 2.0 Metadata Specification

These standards define how authentication, assertion exchange, and identity data are securely handled between the Identity Provider and Eurekos.

Security Model in Eurekos

When using SAML:

  • Authentication is handled entirely by the Identity Provider
  • Eurekos does not store or validate user passwords
  • Identity is verified using signed SAML assertions (XML-based)
  • Trust is established through certificates and metadata exchange
  • Communication follows standardized, encrypted protocols

As a result, Eurekos inherits the security policies defined in the Identity Provider, including:

  • Multi-factor authentication (MFA / 2FA)
  • Conditional access policies
  • Identity governance controls

Access and User Lifecycle Control

Because authentication is delegated externally:

  • Access to Eurekos depends entirely on the Identity Provider
  • Disabling or removing a user in the Identity Provider immediately prevents login
  • No manual deactivation in Eurekos is required

Eurekos becomes part of your organization’s identity and security framework, ensuring consistent access control and reducing administrative overhead.

Common Identity Provider Configurations

While SAML 2.0 follows a standard, each Identity Provider has its own terminology and setup flow. The configuration in Eurekos remains consistent, but how values are obtained and defined may differ slightly depending on your provider.

Below are common patterns to help align configuration across typical enterprise setups.

Microsoft Entra ID (Azure AD)

In Microsoft Entra ID, SAML is configured through an Enterprise Application.

  • The Identifier (Entity ID) represents Eurekos as the service provider
  • The Reply URL (Assertion Consumer Service / ACS URL) is the endpoint in Eurekos that receives the SAML response
  • The Signing certificate is used to validate incoming assertions
  • User attributes are configured under Attributes & Claims

A typical setup includes:

  • Entity ID and ACS URL provided by Eurekos
  • NameID configured as email (or another unique identifier)
  • Additional attributes such as department, job title, or manager

💡 In many organizations, Azure AD is also used to enforce MFA and conditional access policies, which automatically apply to Eurekos when using SAML.

Okta

In Okta, SAML is configured by creating a SAML 2.0 Application.

  • The Single sign-on URL corresponds to the Eurekos ACS URL
  • The Audience URI (SP Entity ID) identifies Eurekos
  • The X.509 certificate is used to sign assertions
  • Attributes are configured through attribute statements

Typical considerations:

  • Ensure NameID format is correctly configured (typically email)
  • Map attributes clearly (e.g. email, first name, last name)
  • Test configuration using Okta’s preview and test tools before enabling in Eurekos

OneLogin

In OneLogin, SAML is configured through a SAML App Connector.

  • The ACS URL defines where the authentication response is sent
  • The Audience (Entity ID) identifies Eurekos
  • Certificates are used to sign and validate assertions
  • User attributes are mapped through parameter configuration

Common setup includes:

  • Defining user attributes explicitly (e.g. email, username)
  • Ensuring consistent naming between OneLogin and Eurekos
  • Verifying that attribute statements are correctly included in the SAML assertion

Key Takeaways Across Providers

Although setup steps differ slightly, the integration always depends on the same core elements:

  • A registered SAML application
  • Entity ID (service provider identifier)
  • Assertion Consumer Service (ACS URL)
  • Identity Provider metadata (URL or XML)
  • Signing certificates for trust validation
  • Properly defined user attributes (attribute statements)

The most important success factor is alignment between the Identity Provider configuration and Eurekos attribute mapping.

FAQ