What you'll learn in this article: If your company uses OneLogin as an identity provider, you can easily set up SSO on your own. Here's how.
Depending on the identity provider your company uses and which protocol you would like to use, you can configure SSO on your own. TravelPerk provides self-setup for Azure, G Suite and OneLogin using OAuth. The rest of the identity providers will be configured using SAML.
Setting up a new SSO integration for OneLogin with OAuth
- You need to have admin rights in both TravelPerk and OneLogin to be able to set this up.
To configure a new SSO login, follow these steps:
- Go to Company Settings > Integrations > SSO
- Click on Setup
- Click on OneLogin Oath2 button. This will take you to the configuration of a new OneLogin integration.
- Add TravelPerk to your OneLogin account: Search for the TravelPerk App on the OneLogin Catalog and add it to your company account
- Modify authentication method: Under the Token Endpoint section, change the Authentication method from Basic to POST
- Ensure you provide Access to the users that will be accessing TravelPerk
- Copy the Client ID and Client secret from your application
- Paste the Client ID and Client secret on the SSO setup
- Enter your company subdomain and press Authenticate
- Authenticate using your OneLogin credentials
- After signing in, your account will be linked and you will be taken to the SSO settings page on TravelPerk.
Keep in mind: To make sure your app redirects to your unique TravelPerk URL, copy your corporate login URL from your SSO integration. Go to your TravelPerk application in your OneLogin account, navigate to the Configuration section and paste it on the Login URL field. Make sure you save the changes.
To read about the available SSO options, go to this article: What SSO settings can I customize?
To know how to set up SSO for other identity providers with OAuth, you may refer to the articles below: