Wrike - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team
This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Wrike using MPAS. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization.
To set up Multi-Pass with Wrike, ensure you meet the following requirements:
- Wrike admin rights
- MPAS Admin rights
- Make sure that all users intended to use SSO in Wrike are registered in your IdP and have the necessary permissions to access Wrike.
Important: Custom elements in URLs (like tenant names) are case sensitive. Make sure to match the exact casing from your environment.
Wrike - SSO configuration
Step 1 - Enable SAML in Wrike
- Log in to your Wrike dashboard.
- Click on your profile icon (top-left) and select Settings.
- On the left menu, click on Security.
- Scroll down to the SAML SSO section.
- Click on Set up SAML.
- In the pop-up window, choose Other as your SAML provider.
- Click Next.
- Download the metadata file provided by Wrike.
- Click Next (you'll return here after configuring MPAS).
- Open Multi-Pass Dashboard
- Select your tenant.
- Click on Advanced Console from the left menu.
- Navigate to Clients and click Import Client.
- Upload the Wrike metadata file.
- Complete the following required fields:
| Field | Value |
|---|
| Name | wrike |
| Description | SSO integration |
| Always Display in UI | ON
|
- In the Access Settings section, verify the following:
- Click Save and go to the Keys tab.
- Ensure both Signing Keys and Encryption Keys are set to OFF.
- Go to the Advanced tab.
- Verify all fields have been pre-filled by the metadata file. and modify
- Assertion Consumer Service POST Binding URL = Valid redirect URIs (https://login.wrike.com/saml/SSO)
- Click on Client scope
- Locate the line role_list
- ensure it is marked as optional
- In the MPAS console, click on Realm Settings (bottom left).
- Scroll down and click SAML 2.0 Identity Provider Metadata.
- A new window will open. Copy the metadata URL.
- Return to the Wrike configuration.
- Paste the URL and click Next.
- Click on Enable SAML Settings
- A pop-up will advise testing login in an incognito window before saving
- Once tested, click Save SAML Settings.
- Back on the Security page, toggle "Enforce login via SAML SSO" to activate SSO for all users.

Related Articles
Mulesoft - SSO Integration
This application has been formally tested by Kelvin Zero Inc. This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Mulesoft using Multi-Pass. SSO simplifies user authentication by allowing access to multiple ...
SAML SSO Integration Guide
This guide provides an overview of how to configure SAML Single Sign-On (SSO) between Multi-Pass and a third-party Service Provider (SP). Multi-Pass acts as the Identity Provider (IdP) in this federation model. Multi-Pass is working on SCIM support ...
Rocket.chat - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Rocket.chat using MPAS. SSO simplifies user authentication by allowing access to multiple ...
Huntress - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Huntress using MPAS. SSO simplifies user authentication by allowing access to multiple ...
Calendly - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Calendly using MPAS. SSO simplifies user authentication by allowing access to multiple ...