Huntress - SSO configuration

This documentation has been tested and approved by Kelvin Zero's team

This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Huntress using MPAS. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization.

To set up Multi-Pass with Huntress, ensure you meet the following requirements:
- Huntress admin rights
- MPAS Admin rights
- Make sure that all users intended to use SSO in Huntress are registered in your IdP and have the necessary permissions to access Huntress.
Important: Custom elements in URLs (like realm names) are case sensitive. Make sure to match the exact casing from your environment.
Huntress - SSO configuration
Start SAML SSO Setup in Huntress
- Log in to your Huntress dashboard.
- In the top-right corner, click on the three horizontal lines (menu).
- Go to Settings.
- In the Single Sign-On section, click on Set up SAML SSO.
- A window will open asking for three fields to complete:
- SSO Service URL
- Entity ID URL
- Certificate
We will retrieve these values from Multi-Pass shortly.
- Go to Open Multi-Pass Deployment Dashboard and authenticate.
- Select your deployment.
- In the left-hand menu, click on Advanced Console.
- Once redirected, click on Clients.
You have two options:
- Import Client using the Huntress metadata file.
- Manually create the client (described below).
Create a New Client Manually
- Click on Create Client and fill in the following fields:
Field | Value |
---|
Client Type | SAML |
Client ID | https://huntress.io/sso/metadata |
Name | Huntress (or any name you prefer) |
Description | e.g., Huntress SSO Integration |
Always display in UI | ON
|
- Click Next and configure the next fields
- Click Save
- finalize the configuration, In the Settings tab under SAML Capabilities:
Setting | Value |
---|
Name ID Format | email |
Force Name ID Format | ON |
- Under Signature and Encryption:
Setting | Value |
---|
Sign Assertions | ON
|
- Click Save and go on the Keys tab
- Ensure both options are set to OFF
- Go to the advanced tab
- Click Save
Retrieve the Certificate
- In the left-hand menu, click on Realm Settings.
- Go to the Keys tab.
- Locate the RS256 line.
- Click on Certificate and copy the full X.509 certificate (You will need this for Huntress.)
Finalize Setup in Huntress
Return to the Huntress configuration page and complete the fields:
- Click Save

If you want to remove the 2FA please follow the documentation provided by Huntress
here
Related Articles
HaloPSA - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for HaloPSA using MPAS. SSO simplifies user authentication by allowing access to multiple ...
Auvik - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Auvik using MPAS. SSO simplifies user authentication by allowing access to multiple ...
Blumira - SSO Configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Blumira using MPAS. SSO simplifies user authentication by allowing access to multiple ...
Datadog - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Datadog using MPAS. SSO simplifies user authentication by allowing access to multiple ...
SAML SSO Integration Guide
This guide provides an overview of how to configure SAML Single Sign-On (SSO) between Multi-Pass and a third-party Service Provider (SP). Multi-Pass acts as the Identity Provider (IdP) in this federation model. Multi-Pass is working on SCIM support ...