SuperOps - SSO configuration

SuperOps - SSO configuration

This documentation has been tested and approved by Kelvin Zero's team
This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for SuperOps using MPAS. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization.
To set up Multi-Pass with SuperOps, ensure you meet the following requirements:
- SuperOps admin rights
- MPAS Admin rights
- Make sure that all users intended to use SSO in SuperOps are registered in your IdP and have the necessary permissions to access SuperOps.
Important: Custom elements in URLs (like realm names) are case sensitive. Make sure to match the exact casing from your environment.


SuperOps - SSO configuration



Step 1 – Get Required Information from SuperOps

  1. Log in to your SuperOps dashboard.
  2. On the left menu, click the Settings icon (gear symbol).

  1. Scroll down to Security Management, then click on Technician Login.

  1. Click on the SSO option to begin setup.

  1. Copy the Consumer Service URL displayed, you’ll need this in Multi-Pass. 

SuperOps requires the following user attributes: firstname, lastname, and email.

Step 2 – Create a SAML Client in Multi-Pass

  1. Open Multi-Pass Dashboard
  2. Log in and select your deployment.
  1. In the left menu, click on Advanced Console.

  1. Click on Clients, then click Create client.

  1. Complete the following fields : 
FieldValue
Client TypeSAML
Client IDhttps://superops.ai
Namesuperops
DescriptionSSO integration test
Always Display in UION
  1. Then click Next and complete the fields below:
FieldValue
Home URLhttps://ca.auth.kzero.com/realms/<TENANT_NAME>/protocol/saml/clients/superops
Valid Redirect URIsConsumer Service URL from SuperOps
IDP-Initiated SSO URL Namesuperops
  1. Make sure that the configuration is completed, in the settings tab : 
SettingValue
Name ID Formatemail
Force Name ID FormatON
Sign DocumentsOFF
Sign AssertionsON
  1. Go on the keys tab :
    1. Client Signature Required = OFF
    2. Encrypt Assertions = OFF
  2. Go to the Advanced tab
    1. Assertion Consumer Service POST Binding URL = Consumer URL from SuperOps

Step 3 – Create User Attribute Mappers

  1. Go to Client Scopes, select the associated scope.

  1. Click on Add Mapper > By Configuration > User Attribute.

  1. Complete the fields for each required attribute: email, firstname, lastname.
Example for email:
FieldValue
Nameemail
User Attributeemail
Friendly Nameemail
SAML Attribute Nameemail
  1. Repeat for firstname and lastname.

Step 4 – Collect the x.509 Certificate

  1. In the left menu, go to Realm Settings.
  2. Open the Keys tab.
  3. Find the line labeled RS256, then click Certificate.
  1. Copy the certificate content and paste it into SuperOps.


Step 5 – Finalize SSO Setup in SuperOps

FieldValue
IDP Login URLhttps://ca.auth.kzero.com/realms/<TENANT_NAME>/protocol/saml
CertificatePaste the full x.509 certificate
Logout URLOptional
  1. Click Save and log out — then test passwordless authentication to SuperOps using Multi-Pass



    • Related Articles

    • SAML SSO Integration Guide

      This guide provides an overview of how to configure SAML Single Sign-On (SSO) between Multi-Pass and a third-party Service Provider (SP). Multi-Pass acts as the Identity Provider (IdP) in this federation model. Multi-Pass is working on SCIM support ...
    • Rocket.chat - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Rocket.chat using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • ConnectWise - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for ConnectWise using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • Auvik - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Auvik using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • HaloPSA - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for HaloPSA using MPAS. SSO simplifies user authentication by allowing access to multiple ...