SuperOps - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team
This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for SuperOps using MPAS. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization.
To set up Multi-Pass with SuperOps, ensure you meet the following requirements:
- SuperOps admin rights
- MPAS Admin rights
- Make sure that all users intended to use SSO in SuperOps are registered in your IdP and have the necessary permissions to access SuperOps.
Important: Custom elements in URLs (like tenant names) are case sensitive. Make sure to match the exact casing from your environment.
SuperOps - SSO configuration
- Log in to your SuperOps dashboard.
- On the left menu, click the Settings icon (gear symbol).
- Scroll down to Security Management, then click on Technician Login.
- Click on the SSO option to begin setup.
- Copy the Consumer Service URL displayed, you’ll need this in Multi-Pass.
SuperOps requires the following user attributes: firstname, lastname, and email.
Step 2 – Create a SAML Client in Multi-Pass
- Open Multi-Pass Dashboard
- Log in and select your deployment.
- In the left menu, click on Advanced Console.
- Click on Clients, then click Create client.
- Complete the following fields :
| Field | Value |
|---|
| Client Type | SAML |
| Client ID | https://superops.ai |
| Name | superops |
| Description | SSO integration test |
| Always Display in UI | ON
|
- Then click Next and complete the fields below:
- Make sure that the configuration is completed, in the settings tab :
| Setting | Value |
|---|
| Name ID Format | email |
| Force Name ID Format | ON |
| Sign Documents | OFF |
| Sign Assertions | ON
|
- Go on the keys tab :
- Client Signature Required = OFF
- Encrypt Assertions = OFF
- Go to the Advanced tab :
- Assertion Consumer Service POST Binding URL = Consumer URL from SuperOps
- Go to Client Scopes, select the associated scope.
- Click on Add Mapper > By Configuration > User Attribute.
- Complete the fields for each required attribute: email, firstname, lastname.
Example for email:
| Field | Value |
|---|
| Name | email |
| User Attribute | email |
| Friendly Name | email |
| SAML Attribute Name | email
|
- Repeat for firstname and lastname.
- In the left menu, go to Realm Settings.
- Open the Keys tab.
- Find the line labeled RS256, then click Certificate.
- Copy the certificate content and paste it into SuperOps.
Step 3 – Finalize SSO Setup in SuperOps
- Click Save and log out — then test passwordless authentication to SuperOps using Multi-Pass
Related Articles
SAML SSO Integration Guide
This guide provides an overview of how to configure SAML Single Sign-On (SSO) between Multi-Pass and a third-party Service Provider (SP). Multi-Pass acts as the Identity Provider (IdP) in this federation model. Multi-Pass is working on SCIM support ...
Rocket.chat - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Rocket.chat using MPAS. SSO simplifies user authentication by allowing access to multiple ...
Mulesoft - SSO Integration
This application has been formally tested by Kelvin Zero Inc. This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Mulesoft using Multi-Pass. SSO simplifies user authentication by allowing access to multiple ...
Calendly - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Calendly using MPAS. SSO simplifies user authentication by allowing access to multiple ...
ConnectWise - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for ConnectWise using MPAS. SSO simplifies user authentication by allowing access to multiple ...