Grammarly - SSO configuration

Grammarly - SSO configuration

Alert
Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk.
Quote
This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Grammarly using MPAS. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization
Warning
To set up Multi-Pass with  Grammarly, ensure you meet the following requirements:
- Grammarly Business, Grammarly Pro, or Grammarly for Education account with the admin role or a designated custom role
- MPAS Admin rights
- Make sure that all users intended to use SSO in Grammarly are registered in your IdP and have the necessary permissions to access Grammarly.
Important: Custom elements in URLs (like realm names) are case sensitive. Make sure to match the exact casing from your environment.



Grammarly - SSO configuration




Step - 1 Configuring SAML SSO in Grammarly (Service Provider)

To enable SAML SSO in Grammarly using Multi-Pass as your Identity Provider (IdP), follow these steps from your Grammarly Admin Dashboard:

  1. Go to your Admin Dashboard.
  2. Click on your account and select the Authentication tab.
  3. Enable the SAML-based SSO option.
  4. Complete the required fields with the following information:
FieldValue
IdP Entity IDhttps://ca.auth.kzero.com/realms/<TENANT_NAME>
SSO Login URLhttps://ca.auth.kzero.com/realms/<TENANT_NAME>/protocol/saml
x.509 CertificateFound in Multi-Pass > Realm Settings > RS256 > Certificate

Grammarly also provides an optional method to download or copy metadata for easier configuration.

FieldValue
Entity ID (SP)https://sso.grammarly.com/saml/metadata
ACS URL (Reply URL)https://grammarly.com/sso/acs


Step 2 - Configuring Multi-Pass (Identity Provider)

To configure Multi-Pass as the Identity Provider for Grammarly:

  1. Open Multi-Pass Dashboard

  1. Select your tenant.
  2. Go to Integrations > Applications.

  1. Under the SAML tab, start a new configuration with the following values:
FieldValue
Audience URI / SP Entity ID / Issuerhttps://sso.grammarly.com/saml/metadata
Single Sign-On URLhttps://sso.grammarly.com/saml/assertion
Name ID FormatEmailAddress
  1. Click Add Integration, then go to the Advanced Console.

  1. In Clients, search for Grammarly and verify the following:


FieldValue
Client IDhttps://grammarly.com
Namegrammarly
DescriptionSSO integration
Always Display in UION

Access Settings
FieldValue
Home URLhttps://ca.auth.kzero.com/realms/<TENANT_NAME>/protocol/saml/clients/grammarly
Valid Redirect URIshttps://grammarly.com/sso/acs
IDP-Initiated SSO URL Namegrammarly

SAML Capabilities
SettingValue
Name ID Formatemail
Force Name ID FormatON
Force POST BindingON
Include AuthnStatementON

Signature & Encryption
SettingValue
Sign DocumentsOFF
Sign AssertionsON
  1. Move to the Keys tab and make sure that both parameters are switch to OFF
  2. Then move to the advanced settings and verify :
    1. Assertion Consumer Service POST Binding URL = Valid Redirect URIs = https://grammarly.com/sso/acs

Attribute Mapping

In the Client Scopes section, add the following mappers:

Email
FieldValue
Mapper TypeUser Attribute
NameEmailAddress
User Attributeemail
Friendly NameEmailAddress
SAML Attribute NameEmailAddress

First Name
FieldValue
Mapper TypeUser Attribute
NameFirstName
User AttributefirstName
Friendly NameFirstName
SAML Attribute NameFirstName

Last Name
FieldValue
Mapper TypeUser Attribute
NameLastName
User AttributelastName
Friendly NameLastName
SAML Attribute NameLastName

    • Related Articles

    • SAML SSO Integration Guide

      This guide provides an overview of how to configure SAML Single Sign-On (SSO) between Multi-Pass and a third-party Service Provider (SP). Multi-Pass acts as the Identity Provider (IdP) in this federation model. Multi-Pass is working on SCIM support ...
    • Rocket.chat - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Rocket.chat using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • Wrike - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Wrike using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • ConnectWise - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for ConnectWise using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • SuperOps - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for SuperOps using MPAS. SSO simplifies user authentication by allowing access to multiple ...