Documentation

Go to Portal Website

SAML SSO Integration

Overview

Enterprise tenants can use SAML 2.0 Single Sign-On to let users authenticate through a corporate identity provider. SSO centralizes access policy, MFA, joiner/mover/leaver processes, and group-based authorization for AppTego Portal users.

Supported identity providers include Okta, Microsoft Entra ID, OneLogin, and other SAML 2.0 compliant providers.

Setting Up SAML SSO

Prerequisites

Configuration Steps

  1. Navigate to SAML SSO
  1. Copy AppTego service provider details
  1. Configure your identity provider
  1. Add IdP details to AppTego
  1. Configure group mappings
  1. Enable SSO enforcement after testing

Testing

  1. Save the SAML configuration while SSO-only enforcement is still off.
  2. Start a SAML login flow for the tenant.
  3. Verify you are redirected to your IdP and can authenticate.
  4. Verify you return to AppTego with the correct user identity.
  5. Confirm group mappings grant only the intended AppTego permissions.
  6. Confirm a breakglass admin can still access the tenant before enforcing SSO-only access.

Login Flow

  1. User opens the AppTego login page.
  2. User enters their email or selects SSO login.
  3. AppTego determines whether the tenant uses SAML.
  4. User is redirected to the IdP for authentication.
  5. The IdP authenticates the user and returns a SAML assertion.
  6. AppTego validates the assertion and creates or updates the user session.
  7. User enters the portal with permissions derived from AppTego role settings and group mappings.

Group-Based Authorization

Map IdP groups to AppTego permissions:

IdP Group ExampleAppTego Permission
apptego-adminsAll permissions
apptego-buildersbuild_applications
apptego-configmodify_configuration

Configure group mappings in User Management -> SAML Groups. Group names are matched exactly to the values sent by your IdP in the configured group attribute.

MFA Behavior

Breakglass Account

When SSO enforcement is enabled, maintain a breakglass admin path for emergency access. This account bypasses SAML authentication and uses standard AppTego login.

Use breakglass access only when the IdP is unavailable or SSO configuration must be repaired. Protect it with strong credentials, MFA, and limited access to trusted administrators.

The breakglass dropdown only includes tenant users with user_and_api_management. While a user is selected as the breakglass account, the portal prevents removing that permission from the user.

EndpointMethodDescription
/frontend/saml/login/{tenantId}GET/POSTInitiate SAML login
/frontend/saml/acs/{tenantId}POSTAssertion Consumer Service (callback)
/frontend/saml/metadata/{tenantId}GETSP metadata for IdP configuration
/frontend/saml/exchangePOSTExchange SAML session for JWT
/frontend/saml/check_sso/{tenantId}POSTCheck if SSO is configured
/frontend/saml_settingsGET/POST/DELETEManage SAML configuration
/frontend/saml_parse_metadataPOSTParse uploaded IdP metadata XML
/frontend/saml_groupsGET/POSTManage group mappings
/frontend/saml_groups/{id}DELETEDelete a group mapping