SAML is an acronym for Security Assertion Markup Language, an XML-based communication standard used to authenticate and authorize users between a particular identity provider and a service provider. SAML helps to increase security and enables single sign on (SSO). When enabled with Campaign Studio, this integration offers enhanced security and streamlined user management for your IT department while reducing your users’ requirements for usernames and passwords.
Click the settings wheel in the top right corner to open the Settings menu.
Navigate to Configuration > User/Authentication Settings.
Within your IDentity Provider (IDP), you may need to add the instance URL
for your Campaign Studio instance as the entity ID. Be sure to use the
URL with your custom domain, not yourcompany.mautic.net
.
Enter the following data from your IDP in Campaign Studio:
.xml
file.Once you’ve configured Campaign Studio with your IDP, Campaign Studio will by
default redirect sign in attempts to the IDP’s login page. You can sign into
the instance directly by adding /s/login
to the end of your instance URL
(like: https://subdomain.yourcompany.com/s/login
). Sign in to the IDP,
which redirects you back to Campaign Studio. If successful, the IDP will create
the user in Campaign Studio (if the user doesn’t exist) and sign the user in.
Note
For users who have SAML/SSO enabled and configured:
If a user forgets or needs to change the password for SSO, the SSO admin is responsible for resetting the password in the SSO admin settings.
If you see the following notification on the Campaign Studio login page, retry logging in before contacting the administrator. If the issue persists, the administrator must verify that the SSO configuration is correct as this can occur due to invalid certificate, invalid metadata, or both.