Configure SSO

Configure SSO

SSO via SAML involves Zoho trusting the assertions provided by your Identity Provider (IdP) to grant access to your users. This trust must be established by configuring SAML at your IdP and at Zoho.
Steps involved in configuring SAML for your Zoho account:
  1. Obtain the login URL, logout URL, and the base 64 encoded certificate from your IdP. Learn how to obtain those URLs from your IdP.
  2. Sign in to your Zoho account as an administrator and configure SAML under Settings.
  3. Save the configuration and download the metadata file from Zoho. The metadata file will contain the ACS URL, Service provider logout URL, entity ID, and the Zoho certificate (if logout response is enabled). 
  4. Upload this metadata file to your IdP to finish the configuration.

    • Related Articles

    • How does SSO works?

      IDP intitiated flow The user wants to access a Zoho service. The user logs in to their Identity Provider (IdP )and chooses the Zoho application. IdP will create a signed SAML assertion response, which is sent to the ACS (Assertion Consumer Service) ...
    • Configure Domains

      The list of domains validated for unattended access will be displayed here. You can add, manage, and configure domains. Navigate to Settings > Unattended access > Domains. All domains will be displayed by default. Select the domain which you want to ...
    • Configure Domains

      The list of domains validated for unattended access will be displayed here. You can add, manage, and configure domains. Navigate to Settings > Unattended access > Domains. All domains will be displayed by default. Select the domain which you want to ...
    • Configure Pipeline

      Motivator uses data from CRM to show pipeline velocity and pipeline stages on dashboards. You can define how you would like the pipeline reports to be presented.   Set definition of potential stages Click your name in the top-right corner of the ...
    • Configure MFA

      Multi-factor authentication (MFA) adds an additional layer of security to your organization. When MFA is enabled, your users will have to verify their identity not only with their password, but also with a second factor. The second factor could ...