Agent Desktop / Console
...
User Login & Single Sign-On (S...
Configuring SAML SSO with ECC via any IDP
6 min
overview this guide outlines the steps to enable secure single sign on (sso) using saml with ameyo customer engagement platform for both internal employee access and external customer integrations prerequisites administrative access to ameyo server environment access to your identity provider (idp), such as google workspace or salesforce necessary certificates and metadata from the idp steps to configure saml sso 1\ backend configuration access the server hosting ameyo update the configuration files or database entries to enable saml authentication modify the relevant configuration tables, typically involving setting parameters for sso enablement, entity id, and sso url import the idp metadata xml file into ameyo to establish trust 2\ saml settings in ameyo configure the following parameters idp sso url idp entity id x 509 certificate details for signing assertions set the assertion consumer service (acs) url, which should be provided by ameyo 3\ configure identity provider in your idp (e g , google, salesforce), specify the acs url from ameyo upload the service provider metadata (if applicable) define user attributes and roles to be sent in saml assertions 4\ application settings and domain configuration define the domain urls for sso set the default user attribute mappings and attribute transformation rules enable the saml sso feature in ameyo’s admin interface 5\ test and validate restart the ameyo server to apply configuration changes initiate a login flow to verify sso integration confirm users can authenticate via the idp and access ameyo seamlessly additional notes ensure ssl/tls is enabled for all endpoints involved in sso regularly update certificates and metadata to prevent authentication disruptions consult ameyo's official documentation for specific configuration commands and database modification queries if custom scripting is needed troubleshooting tips check logs for errors related to saml assertions or metadata mismatch verify attribute mappings between idp and ameyo confirm that the server clock is synchronized for proper timestamp validation