Lusha - SSO configuration
Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk.
This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Lusha using MPAS. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization
To set up Multi-Pass with Lusha, ensure you meet the following requirements:
- Lusha admin rights
- MPAS Admin rights
- Make sure that all users intended to use SSO in Lusha are registered in your IdP and have the necessary permissions to access Lusha.
Important: Custom elements in URLs (like realm names) are case sensitive. Make sure to match the exact casing from your environment.
Lusha - SSO configuration
Access the Dashboard
- Open Multi-Pass Dashboard
- Select your tenant
- In the left-hand menu, click Integrations, then select Applications
- Under Custom Integration, click SAML
- At the bottom of the form, download the X.509 certificate, it will be needed in Lusha.
- Click Add Integration to create the app.
Adjust Advanced Settings in MPAS Console
- Go the advanced console by clicking on the left side
- Click on client,
- and use the search bar to find the integration you add from the previous steps
- when you are in, make sure all the fields are correctly completed.
- In the settings tab :
Access settings
SAML capabilities
| Setting | Value |
|---|
| Name ID format | email |
| Force Name ID format | OFF |
| Force POST binding | ON |
| Force artifact binding | OFF |
| Include AuthnStatement | ON |
| Include OneTimeUse Condition | OFF |
| Optimize REDIRECT signing key lookup | OFF |
| Allow ECP flow | OFF
|
Signature & Encryption
| Setting | Value |
|---|
| Sign documents | OFF |
| Sign assertions | ON |
- then move to the tab Keys and make sure that both parameters are switch to OFF
- Click on the advanced tab
- Assertion Consumer Service POST Binding URL = Valid Redirect URIs (https://dashboard-services.lusha.com/v2/sso-saml)
Step 2 - Finalize Setup in Lusha
- Contact support@lusha.com to enable SAML SSO on your account.
Send them:
- Once configured by Lusha, test the login from https://auth.lusha.com/sso-login
Related Articles
Intercom - SSO configuration
Valid redirect URIs Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This ...
Huntress - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Huntress using MPAS. SSO simplifies user authentication by allowing access to multiple ...
FortiClient / FortiGate - SSO Configuration
Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a ...
SAML SSO Integration Guide
This guide provides an overview of how to configure SAML Single Sign-On (SSO) between Multi-Pass and a third-party Service Provider (SP). Multi-Pass acts as the Identity Provider (IdP) in this federation model. Multi-Pass is working on SCIM support ...
Rocket.chat - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Rocket.chat using MPAS. SSO simplifies user authentication by allowing access to multiple ...