Lusha - SSO configuration
Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk.
This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Lusha using MPAS. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization
To set up Multi-Pass with Lusha, ensure you meet the following requirements:
- Lusha admin rights
- MPAS Admin rights
- Make sure that all users intended to use SSO in Lusha are registered in your IdP and have the necessary permissions to access Lusha.
Important: Custom elements in URLs (like realm names) are case sensitive. Make sure to match the exact casing from your environment.
Lusha - SSO configuration
Access the Dashboard
- Open Multi-Pass Dashboard
- Select your tenant
- In the left-hand menu, click Integrations, then select Applications
- Under Custom Integration, click SAML
- At the bottom of the form, download the X.509 certificate, it will be needed in Lusha.
- Click Add Integration to create the app.
Adjust Advanced Settings in MPAS Console
- Go the advanced console by clicking on the left side
- Click on client,
- and use the search bar to find the integration you add from the previous steps
- when you are in, make sure all the fields are correctly completed.
- In the settings tab :
Access settings
SAML capabilities
Setting | Value |
---|
Name ID format | email |
Force Name ID format | OFF |
Force POST binding | ON |
Force artifact binding | OFF |
Include AuthnStatement | ON |
Include OneTimeUse Condition | OFF |
Optimize REDIRECT signing key lookup | OFF |
Allow ECP flow | OFF
|
Signature & Encryption
Setting | Value |
---|
Sign documents | OFF |
Sign assertions | ON |
- then move to the tab Keys and make sure that both parameters are switch to OFF
- Click on the advanced tab
- Assertion Consumer Service POST Binding URL = Valid Redirect URIs (https://dashboard-services.lusha.com/v2/sso-saml)
Step 2 - Finalize Setup in Lusha
- Contact support@lusha.com to enable SAML SSO on your account.
Send them:
- Once configured by Lusha, test the login from https://auth.lusha.com/sso-login
Related Articles
Wrike - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Wrike using MPAS. SSO simplifies user authentication by allowing access to multiple ...
Intercom - SSO configuration
Valid redirect URIs Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This ...
Huntress - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Huntress using MPAS. SSO simplifies user authentication by allowing access to multiple ...
FortiClient / FortiGate - SSO Configuration
Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a ...
Rocket.chat - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Rocket.chat using MPAS. SSO simplifies user authentication by allowing access to multiple ...