Addigy - SSO configuration

Addigy - SSO configuration

Idea
This documentation has been tested and approved by Kelvin Zero's team
Quote
This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Addigy using MPAS. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization.
Warning
To set up Multi-Pass with Addigy, ensure you meet the following requirements:
- Addigy admin rights
- MPAS Admin rights
- Make sure that all users intended to use SSO in Addigy are registered in your IdP and have the necessary permissions to access Addigy.
Important: Custom elements in URLs (like realm names) are case sensitive. Make sure to match the exact casing from your environment.



Addigy - SSO configuration


Start Configuration in Addigy

  1. Log in to your Addigy dashboard.
  2. In the left-hand navigation bar, click Account, then select Integration.
  3. Scroll down to the Log In Options section.
  4. Click on New SAML App.

  1. A configuration window will appear with several fields to complete. Keep this page open.

Configure the Client in Multi-Pass (MPAS)

  1. Go to Open Multi-Pass Dashboard
  2. Select your deployment, then click Advanced Console on the left.

  1. In the new console, go to Clients > Create Client.

NotesIf Addigy provides a metadata file, you can also click Import Client to simplify the setup.

Manual Client Configuration

FieldValue or Action
Client TypeSAML
Client IDEntity ID provided by Addigy
Namee.g., Addigy
Descriptione.g., SSO Integration
Always display in UION
  1. Click Next to proceed.


FieldValue
Home URLhttps://ca.auth.kzero.com/realms/Randintegration/protocol/saml/clients/addigy
Valid Redirect URIsBased on Addigy
IDP-Initiated SSO URL Nameaddigy
  1. Click Save.

Review Settings in Each Tab

Settings Tab

SettingValue
Valid Redirect URIsProvided by Addigy
IDP-Initiated SSO URL Nameaddigy
Home URLhttps://ca.auth.kzero.com/<TENANT_NAME>/protocol/saml/clients/
Relay StateOptional
Name ID Formatemail
Force Name ID FormatON
Sign DocumentsOFF
Sign AssertionsON 

Keys Tab

  1. Make sure both parameters are switch to OFF

Advanced Tab

  1. make sure Assertion Consumer Service POST Binding URL = Valid Redirect URIs

Attribute Mapping (Required by Addigy)

Addigy requires the following attributes:
  1. given_name → user's first name
  2. family_name → user's last name
  3. email → user's email
To configure them:
  1. Click on the Client Scopes tab.
  2. Select the assigned client scope (same as your Client ID).

  1. Click Add Mapper > By Configuration > User Property.

Create mappers one by one:

FieldValue
Namegiven_name / family_name
PropertyfirstName / lastName
Friendly Namegiven_name / family_name
SAML Attribute Namegiven_name / family_name
SAML Attribute Name FormatBasic



Notes
Repeat the process for email if not already included by default.

Retrieve the X.509 Certificate

  1. In the left menu, click on Realm Settings.
  2. Go to the Keys tab.
  3. On the RS256 line, click Certificate.
  4. A window will open — copy the certificate and paste it into a Notepad file for use in Addigy.

Finalize Setup in Addigy

  1. Back in the SAML App configuration page in Addigy: 
FieldValue
App NameMulti-Pass (or any label)
SSO URLhttps://ca.auth.kzero.com/realms/<TENANT_NAME>/protocol/saml
CertificateUpload X.509 certificate from MPAS
Allow Automatic User ProvisioningON
Allow IdP-Initiated SSOON
  1. Click Update, then switch the toggle to Enabled in the top-right corner.


Notes
You're Done!
Multi-Pass is now fully integrated as a SAML Identity Provider for Addigy.
Your users can now authenticate passwordlessly using their Multi-Pass account.



    • Related Articles

    • SAML SSO Integration Guide

      This guide provides an overview of how to configure SAML Single Sign-On (SSO) between Multi-Pass and a third-party Service Provider (SP). Multi-Pass acts as the Identity Provider (IdP) in this federation model. Multi-Pass is working on SCIM support ...
    • Datadog - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Datadog using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • Trend Micro - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Trend Micro using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • Zendesk - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Zendesk using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • BambooHR - SSO Configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Bamboo HR using MPAS. SSO simplifies user authentication by allowing access to multiple ...