PandaDoc - SSO Configuration
This application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk.
This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for PandaDoc using Multi-Pass. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization
To set up Multi-Pass with PandaDoc, ensure you meet the following requirements:
To set up Multi-Pass with PandaDoc, ensure you meet the following requirements:
- PandaDoc admin rights
- MPAS Admin rights
- Make sure that all users intended to use SSO in PandaDoc are registered in your IdP and have the necessary permissions to access PandaDoc.
Important: Custom elements in URLs (like realm names) are case sensitive. Make sure to match the exact casing from your environment.
PandaDoc - SSO configuration

- Click Add integration
- Select Advanced Console
- Click Clients and search for PandaDoc
- Verify the different fields and tabs :
General settings (Multi-Pass)
| Setting | Value |
|---|
| Client ID | https://pandadoc.com |
| Name | pandadoc |
| Description | PandaDoc SSO Integration |
| Always Display in UI | ON
|
Access settings
SAML Capabilities
| Setting | Value |
|---|
| Name ID Format | email |
| Force Name ID Format | ON |
| Force POST Binding | ON |
| Include AuthnStatement | ON |
Signature & Encryption
| Setting | Value |
|---|
| Sign Documents | OFF |
| Sign Assertions | ON |
- Go to the Keys tab and ensure both parameters are set to OFF.
Go to the Advanced tab:
Adding Mappers
- Click the Client scopes tab.
- Click the first option in the list.

- Select Configure a New Mapper
- Select User Attributes
- Create two User Attributes based on the tables below.
First Name Mapper
| Field | Value |
|---|
| Mapper type | User Attribute |
| Name | FirstName |
| User Attribute | firstName |
| Friendly Name | FirstName |
| SAML Attribute Name | FirstName |
| SAML Attribute NameFormat | Basic |
| Aggregate Attribute Values | OFF |
Last Name Mapper
| Field | Value |
|---|
| Mapper type | User Attribute |
| Name | LastName |
| User Attribute | lastName |
| Friendly Name | LastName |
| SAML Attribute Name | LastName |
| SAML Attribute NameFormat | Basic |
| Aggregate Attribute Values | OFF
|
Related Articles
D2L Brightspace - SSO Integration
This application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a step-by-step guide to ...
Mulesoft - SSO Integration
This application has been formally tested by Kelvin Zero Inc. This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Mulesoft using Multi-Pass. SSO simplifies user authentication by allowing access to multiple ...
SAML SSO Integration Guide
This guide provides an overview of how to configure SAML Single Sign-On (SSO) between Multi-Pass and a third-party Service Provider (SP). Multi-Pass acts as the Identity Provider (IdP) in this federation model. Multi-Pass is working on SCIM support ...
Miro - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Miro using MPAS. SSO simplifies user authentication by allowing access to multiple ...
Pipedrive – SSO configuration
This application has been formally tested by Kelvin Zero Inc. This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Pipedrive using Multi-Pass. SSO simplifies user authentication by allowing access to multiple ...