SAML Setup
SAML (Security Assertion Markup Language) allows your organization to integrate Devici with an external Identity Provider (IdP) to enable Single Sign-On (SSO).
This guide explains where to configure SAML in Devici and how to complete the required setup with your identity provider.
Overview
SAML enables centralized authentication by allowing users to sign in to Devici using their corporate identity provider, such as:
- Okta
- Microsoft Entra ID (Azure AD)
- Other SAML 2.0–compatible providers
SAML configuration is managed by administrators and applies at the organization level.
Accessing SAML Settings
To access SAML configuration:
- From the main Devici interface, select the Security icon.
- Choose Manage SAML.
The SAML configuration settings will open in the management panel.
SAML Configuration Settings
The following values are required to configure SAML between Devici and your Identity Provider.
Entity ID
The Entity ID is the unique identifier that represents Devici as a Service Provider (SP) to your Identity Provider.
- This value is generated by Devici
- Copy the Entity ID from the Devici SAML configuration screen
- Paste it into the corresponding field in your IdP
ACS URL (Assertion Consumer Service URL)
The ACS URL (also called the Reply URL) is the endpoint where Devici receives authentication assertions from the IdP.
- Copy the ACS URL provided by Devici
- Paste it into the IdP SAML configuration
- This value must match exactly
Logout Flow
To support SAML logout:
- Copy the logout URL provided by Devici
- Add it to the logout configuration in your Identity Provider
This ensures users are logged out consistently across systems.
Metadata
SAML metadata defines how Devici and the IdP communicate.
- Request the SAML metadata from your Identity Provider
- Provide the metadata to Devici as either:
- A metadata URL, or
- An XML metadata file
This metadata contains certificates, endpoints, and protocol details.
Attribute Mapping
Attribute mapping connects identity provider user fields to Devici user fields.
Common mappings include:
- Email → email address
- First name → given name
- Last name → family name
Mappings must align with the fields provided by your IdP.
Domain Identifiers
To route users directly to your Identity Provider’s login page:
- Add one or more email domains (1–50 supported)
- Example:
federated_user@company-domain.com- Domain:
company-domain.com
Users with matching domains will be redirected to your IdP instead of the standard Devici login screen.
IdP-Initiated Sign-In (Optional)
Devici supports Identity Provider (IdP)-initiated sign-in, allowing users to start authentication directly from their IdP portal instead of navigating to the Devici login page.
Availability
IdP-initiated sign-in is not enabled by default.
At this time, this capability must be enabled by Devici Support.
How to Enable
To request IdP-initiated sign-in:
- Complete the standard SAML configuration in Devici.
- Contact Devici Support via the Support Portal and request enablement of IdP-initiated SAML sign-in for your organization.
-
Provide the following information:
-
Your organization name
- Your Identity Provider
- Confirmation that SAML setup has been completed
Once enabled, Devici will validate the configuration and confirm when IdP-initiated sign-in is active.
Notes and Considerations
- IdP-initiated sign-in is commonly used for centralized access portals and dashboards.
- Service Provider (SP)-initiated sign-in (starting from the Devici login page) remains supported.
- Domain identifiers are still recommended to ensure predictable routing behavior.
If you are unsure whether IdP-initiated sign-in is appropriate for your organization, contact Devici Support for guidance.
Advanced Settings (Optional)
Additional encryption options are available for SAML assertions.
If enabled:
- Submit the SAML configuration in Devici.
- Download the encryption certificate provided by Devici.
- Upload the certificate to your Identity Provider configuration.
This step is optional but recommended for higher security requirements.
Importing Federated Users
After SAML configuration is complete, federated users must be imported into Devici.
To import users:
- Export user data from your Identity Provider.
- Upload the user list as a CSV file in Devici.
This step creates user accounts tied to federated identities.
Best Practices
- Ensure attribute mappings match IdP claims exactly
- Use domain identifiers to streamline login flow
- Keep metadata and certificates up to date
SAML integration helps centralize identity management while maintaining secure access to Devici.