Salesforce - SSO configuration

Salesforce - SSO configuration

Idea
This documentation has been tested and approved by Kelvin Zero's team
Quote
This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Salesforce using MPAS. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization.
Warning
To set up Multi-Pass with  Salesforce, ensure you meet the following requirements:
-  Salesforce admin rights
- MPAS Admin rights
- Make sure that all users intended to use SSO in Salesforce are registered in your IdP and have the necessary permissions to access Salesforce.
Important: Custom elements in URLs (like realm names) are case sensitive. Make sure to match the exact casing from your environment.


Salesforce - SSO configuration



Notes
This guide is based on the Salesforce Developer Environment. Your production dashboard layout may differ slightly, but the steps and configuration remain consistent.

Step 1 -  Enable SAML SSO in Salesforce

  1. On your Salesforce dashboard, click the ⚙️ gear icon (top-right corner) and select Setup.

  1. In the left navigation bar, scroll down to Settings
  2. Click Identity, then click Single Sign-On Settings.

  1. Under SAML Single Sign-On Settings, click New from Metadata File.

  1. Upload the metadata file you’ll generate in MPAS (instructions below).
  2. Click Create.
You will now be redirected to a configuration page. Ensure the following options are toggled ON:
SettingStatus
Assertion contains the user's Salesforce usernameEnabled
Identity is in the NameIdentifier element of the Subject statementEnabled
HTTP POSTEnabled
Use Salesforce MFA for this SSO ProviderEnabled
Single Logout EnabledEnabled
Use selected request signature method for Single LogoutEnabled
Single Logout Request BindingHTTP POST




 Step 2 - Import the Metadata into Multi-Pass

  1. Open Multi-Pass Dashboard
  2. Select your tenant and go to the Advanced Console.

  1. In the left sidebar, click Clients, then Import Client.

  1. Upload the Salesforce metadata file.

  1. Complete the following fields:
FieldValue
NameSalesforce
DescriptionYour choice
Always Display in UION


Step 3 - Finalize Configuration in MPAS

Now make sure that the next fields are completed
  1. General Settings
FieldValue
Home URLhttps://ca.auth.kzero.com/realms/<TENANT_NAME>/protocol/saml/clients/<APP_NAME>
Valid Redirect URIsAutomatically filled or matches the Salesforce Login URL
Valid Post Logout URIsAutomatically filled or matches the Salesforce Logout URL
IDP-Initiated SSO URL Name<APP_NAME>
  1. SAML Capabilities
SettingValue
Name ID Formatemail
  1. Signature and Encryption
SettingValue
Sign DocumentsON
Sign AssertionsON
  1. Click Save, then go to the Keys tab and make sure:
FieldValue
Signing Keys ConfigurationOFF
Encryption Keys ConfigurationOFF
  1. Switch to the Advanced tab and verify the following fields (automatically filled):
FieldValue
Assertion Consumer Service POST Binding URLFrom metadata or login URL
Logout Service POST Binding URLFrom metadata or logout URL
Logout Service Redirect Binding URLFrom metadata or logout URL
 

Retrieving MPAS Metadata

  1. To obtain the SAML metadata from Multi-Pass:
    1. In the Advanced Console, click Realm Settings (bottom-left).
    2. Scroll down to SAML 2.0 Identity Provider Metadata.
    3. A popup will open:
      1. Either copy the metadata URL to paste in Salesforce.
      2. Or right-click the page and save it as a .xml file.


Step4 - Finalize SSO Setup in Salesforce

  1. Go back to the Single Sign-On Settings in Salesforce.
  2. Click Edit and toggle SAML Enabled → Save.

  1. To assign SSO to your domain:
    1. In the left menu, go to Settings → Company Settings → My Domain.

    1. Scroll down to Authentication Configuration.
    2. Click Edit.
    3. Select the SSO you created (based on the name).
    4. Customize the login button label (optional).
    5. Click Save.



Your Salesforce account is now configured for secure, passwordless login using Multi-Pass as a SAML Identity Provider.

    • Related Articles

    • SAML SSO Integration Guide

      This guide provides an overview of how to configure SAML Single Sign-On (SSO) between Multi-Pass and a third-party Service Provider (SP). Multi-Pass acts as the Identity Provider (IdP) in this federation model. Multi-Pass is working on SCIM support ...
    • Rocket.chat - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Rocket.chat using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • HaloPSA - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for HaloPSA using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • Wrike - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Wrike using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • Grammarly - SSO configuration

      Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a ...