SSO SAML
This article explains how to set up the SSO integration for Pulse with Google and Okta via Security Assertion Markup Language (SAML).
Google
Follow this guide to set up the SSO integration for Pulse using Google.
Step 1: Set up Google as a SAML identity provider (IdP)
In your Google Admin console, go to Apps > Web and mobile apps. Once there, click on Add app > Add custom SAML app.
Write “Pulse” in the App name field. As an optional step, you can upload a custom logo for Pulse. Then click Continue.
Download the IDP metadata on the Google Identity Provider details page.
On the Service provider details page, set the following:
- ACS URL:
https://app.pulse.support/auth/saml/{domain with '.' replaced by '--'}/callback
- Entity ID:
https://app.pulse.support/sp/saml
- Check the Signed response checkbox.
- Enter EMAIL in the Name ID format field and click Continue.
On the Attribute Mapping page, map Google directory attributes to corresponding application attributes:
- Click Add Mapping.
- Select Primary email as the Google directory attribute and email as the app attribute.
As an optional, follow this instruction if you want to send a user’s group membership information in the SAML response:
- Under Google groups, click the Search for a group entry field.
- Enter group names and select them from the dropdown.
- Choose the group name from the dropdown list.
- Under App attribute, enter the service provider’s corresponding groups attribute name.
On the Attribute mapping page, click Finish.
Step 2: Assign the app to users
Find the SAML app for Pulse, then click User Access. Select the organizational unit (OU) or groups that should have access to Pulse. Toggle the app to ON for the desired OUs or groups.
Step 3: Set up Pulse as a SAML 2.0 service provider
Contact the Pulse support team directly on the platform and include your SSO URL and certificate to complete the integration.
Okta
Follow this guide to set up the SSO integration for Pulse using Okta.
Step 1: Set up Okta as a SAML identity provider (IdP)
To start your setup, log into your Okta admin dashboard, navigate to Applications and click on Create App Integration. Once there, select SAML 2.0 as the Sign-On method and click Next.
In the General Settings section, name the app Pulse. As an optional step, you can upload a custom logo for Pulse
In the SAML Settings section, set:
- Single Sign-On URL:
https://app.pulse.support/auth/saml/{domain with '.' replaced by '--'}/callback.
- Audience URI (SP Entity ID):
https://app.pulse.support/sp/saml
- Ensure the Signed Assertion option is enabled.
In the Attribute Statements section, map Okta attributes to Pulse attributes as follows:
- NameID: Set to email.
- email: Set to user.email.
As an optional step, follow these instructions if you want to include group information:
- In the Group Attribute Statements (Optional) section, map the Okta group attributes to match Pulse’s expected attributes.
Click Next, review the settings, and then click Finish.
Step 2: Assign the app to users
In Okta, navigate to the Assignments tab for the Pulse app and assign the app to users or groups as needed.
Step 3: Set up Pulse as a SAML 2.0 service provider
Contact the Pulse support team directly on the platform and include your SSO URL and certificate to complete the integration.