Slack - SSO configuration

Slack - SSO configuration

Alert
Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk.
Quote
This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Slack using MPAS. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization
Warning
To set up Multi-Pass with Slack, ensure you meet the following requirements:
-  Slack admin rights - Workspace Owners and Org Owners
Available on the Business+ and Enterprise plans
Available on the Free and Pro plans if you've connected a Salesforce org to Slack
- MPAS Admin rights
- Make sure that all users intended to use SSO in Slack are registered in your IdP and have the necessary permissions to access Slack.
Important: Custom elements in URLs (like realm names) are case sensitive. Make sure to match the exact casing from your environment.



Slack - SSO configuration





Step 1 - Prepare Slack for integration with MPAS

  1. Click your workspace name in the top-left corner.
  2. Hover over Tools & settings, then click Workspace settings.
  3. Under Administration in the left sidebar, click SSO & authentication.
    1. For Identity Provider or Custom SAML, click Configure SAML.
  4. Toggle Test mode ON.
  5. In SAML SSO URL, enter your SAML 2.0 Endpoint URL from Multi-Pass.
    1. https://ca.auth.kzero.com/realms/<TENANT_NAME>/protocol/saml
  6. In Identity Provider Issuer, enter your Multi-Pass Entity ID.
    1. https://ca.auth.kzero.com/realms/<TENANT_NAME>
  7. Copy the entire X.509 Certificate from Multi-Pass and paste it into the Public Certificate field. (You can see where to find it in the next steps) 
  8. Click Advanced Options to expand settings:
    • Choose how the SAML response from your IdP is signed.
    • If you need an end-to-end encryption key, check Sign AuthnRequest to display Slack’s public encryption key.
  9. Under Settings, choose whether members can edit their profile after SSO is enabled.
  10. Select whether SSO is required, partially required, or optional.
  11. Click Save Configuration.

Step 2 – Configure Multi-Pass with Slack input

  1. Open Multi-Pass Dashboard

  1. Select your tenant and on the left side click on "Integrations", then "Applications"
  2. Scroll to "custom integration" section and click on SAML.
  1. Fill in the fields of the form : 
FieldValue
Client ID (=Entity ID)https://slack.com
  Name
 For example "Slack"
  Description
 For example "SSO integration"
Assertion Consumer Service URL (=Valid Redirect URIs)https://yourdomain.slack.com/sso/saml
NameID Policy FormatEmail
Tenant certificate (x.509 Certificate)Download (PEM format) and paste it into Slack.
  1. Click on "Add integration" 
  2. Now we need to make sure all the information are well completed : 
  3. On the left side, click on "Advanced console" 
  4. Click on client and use the search bar to find Slack

  1. Now make sure that the fields are completed as follow: 
  2. When you are on the Settings tab, for general settings: 
FieldValue
Client IDhttps://slack.com
NameSlack
DescriptionSAML SSO integration
Always display in UIOn
  1. Access settings : 
FieldValue
Home URLhttps://ca.auth.kzero.com/realms/<TENANT_NAME>/protocol/saml/clients/slack
Valid Redirect URIs (ACS)https://yourdomain.slack.com/sso/saml
Valid Post Logout Redirect URIs(Not supported by Slack SLO – leave empty)
IDP‑Initiated SSO URL nameslack
  1. SAML Capabilities :
FieldValue
Name ID formatemail
Force name ID formatOn
Force POST bindingOn
Include AuthnStatementOn
  1. Signature and Encryption : 
FieldValue
Sign AssertionsOn
Sign DocumentsOff
  1. Click Save and move to the tab "Keys" 
    1. Both parameters have to be switch to OFF
  2. Move to the tab "Advanced" 
    1. Assertion Consumer Service POST Binding URL = Valid redirect URIs = https://yourdomain.slack.com/sso/saml
Notes
Slack does not support Single Logout (SLO) or session duration control from the IdP — configure session duration within Slack if needed.
Ensure the NameID remains consistent and unique for each user over time.
Use Sign AuthnRequest in Slack’s Advanced Options if you require Slack’s public encryption key.
    • Related Articles

    • Wrike - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Wrike using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • SAML SSO Integration Guide

      This guide provides an overview of how to configure SAML Single Sign-On (SSO) between Multi-Pass and a third-party Service Provider (SP). Multi-Pass acts as the Identity Provider (IdP) in this federation model. Multi-Pass is working on SCIM support ...
    • Grafana - SSO configuration

      Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a ...
    • Notion - SSO configuration

      Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a ...
    • Addigy - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Addigy using MPAS. SSO simplifies user authentication by allowing access to multiple ...