Enable SSO & SAML SSO Login

In this article, you will learn how to set up either an SSO login or SAML login for all dispatchers and administrators across their organization. 

This article will cover the following: 

Enable Google SSO 

To enable the Single Sign-On across your organization, log into your Onfleet administrator account and select "Settings". From the "Settings" window, click on "Organization" and scroll to the bottom to view the "Enable Signing In with Google" option.

Enable the toggle to turn on the Single Sign-On option across your organization. 

Once enabled, all of your organization's employees with dashboard access to the Single Sign-On. 

Return to Top

Disable Google SSO

To disable Google SSO for your organization’s dashboard users, simply disable the toggle setting. 

This will disable your organization’s dashboard users’ ability to log in via Google SSO and you can re-enable it at any time by re-checking the setting.

Return to Top

Set-Up Custom SAML SSO

Onfleet currently supports Microsoft Azure and Okta for Custom SAML connections. Please follow the steps below to ensure you have the correct information required for the SAML setup. 

To begin, register Onfleet as an enterprise application within your Microsoft Azure Active Directory or Okta.

Return to Top

Register Onfleet within your Microsoft Azure Active Directory

Log into your Onfleet administrator account, select "Settings" and within the "Organization" tab select "Setup SAML Single Sign-On" - this will provide the information you will need to complete the SAML single sign-on. 

To being, register Onfleet as an enterprise application within your Azure active directory. 

  1. First, log into the Azure portal and open your directory.
  2. From the directory overview page, select “Enterprise Applications” from the sidebar.
  3. Click the “Create your own Application” button.
  4. Provide a name for the application, such as “Onfleet”, and select “Integrate any other application you don't find in the gallery (Non-gallery)”,
  5. From the enterprise application’s overview page, select “Single sign-on” from the sidebar.
  6. Select SAML as the single sign-on method.

Edit the basic SAML configurations, and provide the value found in the "Setup SAML Single Sign-On" window in your admin account:

mceclip0.png

Return to Top

Setup Custom SAML Single Sign-On with Azure

  1. Log into your Onfleet administrator account, select "Settings" and within the "Organization" tab select "Setup SAML Single Sign-On" - this will provide the information you will need to set up your SAML within Microsoft Azure Active Directory. 
  2. Copy the Entity ID and Reply URL (Assertion Consumer Service URL). These values will be needed within the Azure setup
  3. Log into the Microsoft Azure Active Directory portal and open your directory.
  4. From the directory overview page, select “Enterprise Applications” from the sidebar.
  5. Click the “Create your own Application” button.
  6. Provide a name for the application, such as “Onfleet”, and select “Integrate any other application you don't find in the gallery (Non-gallery)”.
  7. From the enterprise application’s overview page, select “Single Sign-On” from the sidebar.
  8. Select SAML as the single sign-on method.
  9. From the single sign-on settings, provide the following values:
    Identifier (Entity ID): Paste the Entity ID
    Reply URL: Paste the Reply URL (Assertion Consumer Service URL)
    Leave the default attributes and claims
  10. Copy the Login URL and paste this into the SAML modal in Onfleet

mceclip4.png

11. Copy the Login URL and paste this into the SAML modal in Onfleet

mceclip5.png

12. Click "Setup".

Return to Top

Setup Custom SAML Single Sign-On with Okta

  1. Log into your Onfleet administrator account, select "Settings" and within the "Organization" tab select "Setup SAML Single Sign-On" - this will provide the information you will need to set up your SAML within Microsoft Azure Active Directory. 
  2. Copy the Entity ID and Reply URL (Assertion Consumer Service URL). These values will be needed within the Okta setup.
  3. Sign into the Okta admin dashboard
  4. From the left sidebar, select Applications > Applications
  5. Click the “Create App Integration”, then select SAML 2.0.
  6. Provide the general settings, including the app name and optionally a logo.
  7. Provide the following SAML Settings:
    • Single sign-on URL: Paste the Reply URL (Assertion Consumer Service URL
    • Audience URI:  Paste the Entity ID
    • Add the following attribute statements:

 

mceclip7.png

Other default SAML settings:

mceclip9.png  

9. The App integration has been created. From the “Sign On” tab, click the button that says “View Setup Instructions”.
10. Copy the “Identity Provider Single Sign-On URL” and paste it as the Login URL in the Onfleet SAML modal
11. Download the x.509 certificate and upload it to the Onfleet SAML modal.
12. Click "Setup".

Return to Top

Disable Custom SAML SSO

To disable Custom SAML SSO for your organization’s dashboard users, simply switch the toggle off. 

This will disable your organization’s dashboard users’ ability to log in via Custom SAML SSO, but leave your configuration intact. 

You can re-enable it at any time by switching the toggle back on.

Return to Top

Remove Custom SAML SSO

To remove Custom SAML SSO for your organization’s dashboard users, select the Manage SAML Single Sign-On button on the Organization settings tab. 

In the Manage modal, select "Remove SAML Single Sign-On". This will disable your organization’s dashboard users’ ability to log in via Custom SAML SSO, and delete the data associated with your configuration. To re-enable, you must follow the setup flow.

Return to Top