Wrike - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team
This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Wrike using MPAS. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization.
To set up Multi-Pass with Wrike, ensure you meet the following requirements:
- Wrike admin rights
- MPAS Admin rights
- Make sure that all users intended to use SSO in Wrike are registered in your IdP and have the necessary permissions to access Wrike.
Important: Custom elements in URLs (like realm names) are case sensitive. Make sure to match the exact casing from your environment.
Wrike - SSO configuration
Step 1 - Enable SAML in Wrike
- Log in to your Wrike dashboard.
- Click on your profile icon (top-left) and select Settings.
- On the left menu, click on Security.
- Scroll down to the SAML SSO section.
- Click on Set up SAML.
- In the pop-up window, choose Other as your SAML provider.
- Click Next.
- Download the metadata file provided by Wrike.
- Click Next (you'll return here after configuring MPAS).
- Open Multi-Pass Dashboard
- Select your tenant.
- Click on Advanced Console from the left menu.
- Navigate to Clients and click Import Client.
- Upload the Wrike metadata file.
- Complete the following required fields:
Field | Value |
---|
Name | wrike |
Description | SSO integration |
Always Display in UI | ON
|
- In the Access Settings section, verify the following:
- Click Save and go to the Keys tab.
- Ensure both Signing Keys and Encryption Keys are set to OFF.
- Go to the Advanced tab.
- Verify all fields have been pre-filled by the metadata file. and modify
- Assertion Consumer Service POST Binding URL = Valid redirect URIs (https://login.wrike.com/saml/SSO)
- Click on Client scope
- Locate the line role_list
- ensure it is marked as optional
- In the MPAS console, click on Realm Settings (bottom left).
- Scroll down and click SAML 2.0 Identity Provider Metadata.
- A new window will open. Copy the metadata URL.
- Return to the Wrike configuration.
- Paste the URL and click Next.
- Click on Enable SAML Settings
- A pop-up will advise testing login in an incognito window before saving
- Once tested, click Save SAML Settings.
- Back on the Security page, toggle "Enforce login via SAML SSO" to activate SSO for all users.

Related Articles
SAML SSO Integration Guide
This guide provides an overview of how to configure SAML Single Sign-On (SSO) between Multi-Pass and a third-party Service Provider (SP). Multi-Pass acts as the Identity Provider (IdP) in this federation model. Multi-Pass is working on SCIM support ...
Rocket.chat - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Rocket.chat using MPAS. SSO simplifies user authentication by allowing access to multiple ...
Intercom - SSO configuration
Valid redirect URIs Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This ...
Lusha - SSO configuration
Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a ...
Huntress - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Huntress using MPAS. SSO simplifies user authentication by allowing access to multiple ...