Wrike - SSO configuration

Wrike - SSO configuration

Idea
This documentation has been tested and approved by Kelvin Zero's team
Quote
This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Wrike using MPAS. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization.
Warning
To set up Multi-Pass with  Wrike, ensure you meet the following requirements:
-  Wrike admin rights
- MPAS Admin rights
- Make sure that all users intended to use SSO in Wrike are registered in your IdP and have the necessary permissions to access Wrike.
Important: Custom elements in URLs (like realm names) are case sensitive. Make sure to match the exact casing from your environment.


Wrike - SSO configuration



Step 1 - Enable SAML in Wrike

  1. Log in to your Wrike dashboard.
  2. Click on your profile icon (top-left) and select Settings.

  1. On the left menu, click on Security.
  2. Scroll down to the SAML SSO section.
  3. Click on Set up SAML.

  1. In the pop-up window, choose Other as your SAML provider.

  1. Click Next.
  2. Download the metadata file provided by Wrike.

  1. Click Next (you'll return here after configuring MPAS).

Step 2 - Configure Multi-Pass (MPAS)

  1. Open Multi-Pass Dashboard
  2. Select your tenant.

  1. Click on Advanced Console from the left menu.

  1. Navigate to Clients and click Import Client.

  1. Upload the Wrike metadata file.

  1. Complete the following required fields:
FieldValue
Namewrike
DescriptionSSO integration
Always Display in UION
  1. In the Access Settings section, verify the following:
FieldValue
Home URLhttps://ca.auth.kzero.com/realms/<TENANT_NAME>/protocol/saml/clients/<APP_Name>
 Valid redirect URIs
IDP-Initiated SSO URL name<APP_Name> (e.g. wrike)
 Name ID format
email
  1. Click Save and go to the Keys tab.
  2. Ensure both Signing Keys and Encryption Keys are set to OFF.
  3. Go to the Advanced tab.
  4. Verify all fields have been pre-filled by the metadata file. and modify 
    1. Assertion Consumer Service POST Binding URL = Valid redirect URIs (https://login.wrike.com/saml/SSO)
  5. Click on Client scope
  6. Locate the line role_list
  7. ensure it is marked as optional



Step 3 - Upload Multi-Pass Metadata to Wrike and finalize configuration

  1. In the MPAS console, click on Realm Settings (bottom left).
  2. Scroll down and click SAML 2.0 Identity Provider Metadata.

  1. A new window will open. Copy the metadata URL.
  2. Return to the Wrike configuration.
  3. Paste the URL and click Next.

  1. Click on Enable SAML Settings

  1. A pop-up will advise testing login in an incognito window before saving

  1. Once tested, click Save SAML Settings.
  2. Back on the Security page, toggle "Enforce login via SAML SSO" to activate SSO for all users.


    • Related Articles

    • SAML SSO Integration Guide

      This guide provides an overview of how to configure SAML Single Sign-On (SSO) between Multi-Pass and a third-party Service Provider (SP). Multi-Pass acts as the Identity Provider (IdP) in this federation model. Multi-Pass is working on SCIM support ...
    • Rocket.chat - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Rocket.chat using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • Intercom - SSO configuration

      Valid redirect URIs Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This ...
    • Lusha - SSO configuration

      Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a ...
    • Huntress - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Huntress using MPAS. SSO simplifies user authentication by allowing access to multiple ...