Shopify - SSO configuration

Shopify - SSO configuration

Alert
Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk.
Quote
This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Shopify Plus using MPAS. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization.
Warning
To set up Multi-Pass with Shopify Plus, ensure you meet the following requirements:
- Shopify Plus admin rights
- MPAS Admin rights
- Make sure that all users intended to use SSO in Shopify Plus are registered in your IdP and have the necessary permissions to access Shopify Plus.
Important: Custom elements in URLs (like realm names) are case sensitive. Make sure to match the exact casing from your environment.




Shopify - SSO configuration




Step 1 — Configure in Shopify

  1. Log in to your Shopify Admin.
  2. Go to Settings, click on Users.
  3. Select Security.
  4. In the SAML configuration section, click Set up configuration.
  5. Paste the Identity Provider metadata URL from your IdP. 
    1. https://ca.auth.kzero.com/realms/<TENANT_NAME>/protocol/saml/descriptor
    2. If your IdP provides an XML file, upload it to Files in Shopify to generate a public metadata URL, then use that URL.
  6. Click Add to save.
  7. Wait until your domain verification is complete before enforcing SAML.
Notes
Recommendation: Test with Specific users first. Keep a backup admin account that is not on the SAML domain and has 2-step authentication.

Shopify SAML Settings
FieldValue
Single Sign-On URL (ACS)https://accounts.shopify.com/saml/consume/organization/{ORG_ID}
Audience URI (SP Entity ID)https://accounts.shopify.com/saml_sp
Sign-On URL (SP-initiated)https://shopify.plus/login
Name ID FormatPersistent
Attributesfirst_name, last_name, email


Step 2 — Configure in Multi-Pass

  1. Open Multi-Pass Dashboard
  2. Select your tenant.
  3. Go to Integrations
  4. Click on Applications.
  5. In the Custom section, choose SAML.
  6. You will arrive on the form to complete.
FieldValue
SP Entity IDhttps://accounts.shopify.com/saml_sp
ACS URLhttps://accounts.shopify.com/saml/consume/organization/{ORG_ID}
NameID FormatEmail
  1. Click on Advanced Console.
  2. Select Client, search for the integration you just created.
  3. Now you need to verify that the following fields are well completed :

General settings

FieldValue
Client IDhttps://accounts.shopify.com/saml_sp
NameShopify
DescriptionSAML integration for Shopify Plus
Always Display in UION

Access settings

FieldValue
Home URLhttps://ca.auth.kzero.com/realms/<TENANT_NAME>/protocol/saml/clients/ShopifyPlus
Valid Redirect URIshttps://accounts.shopify.com/saml/consume/organization/{ORG_ID}
IDP-Initiated SSO URL NameShopifyPlus

SAML Capabilities

SettingValue
Force Name ID FormatON
Force POST BindingON
Include AuthnStatementON

Signature & Encryption

SettingValue
Sign DocumentsOFF
Sign AssertionsON
  • Now that you have checked the different parameters, change to the tab called Keys. Make sure that both parameters are switched to OFF.
  • Now go to the Advanced tab. The field Assertion Consumer Service POST Binding URL must equal the Valid Redirect URIs (ACS).
  • Go to client scope now, 
  • Select configure a new mapper
  • Click on user attribute and you will create three mappers : 
    • Email 
    • Firstname
    • Lastname

Email

FieldValue
Mapper TypeUser attribute
NameEmail
User Attributeemail
Friendly Nameemail
SAML Attribute Nameemail

First Name

FieldValue
Mapper TypeUser attribute
NameFirst Name
User AttributefirstName
Friendly Namefirst_name
SAML Attribute Namefirst_name

Last Name

FieldValue
Mapper TypeUser attribute
NameLast Name
User AttributelastName
Friendly Namelast_name
SAML Attribute Namelast_name
    • Related Articles

    • D2L Brightspace - SSO Integration

      This application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a step-by-step guide to ...
    • Mulesoft - SSO Integration

      This application has been formally tested by Kelvin Zero Inc. This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Mulesoft using Multi-Pass. SSO simplifies user authentication by allowing access to multiple ...
    • Notion - SSO configuration

      Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a ...
    • Heap - SSO configuration

      Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a ...
    • NinjaOne - SSO configuration

      Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a ...