SAML SSO is available on the Business plan and above.
How it works
Configure your IdP
Register Truthlocks as a service provider (SP) in your identity provider.
You need the SP Entity ID and Assertion Consumer Service (ACS) URL from the
setup screen.
Add connection in Truthlocks
In the console, go to Settings > SSO and create a new SAML connection.
Enter your IdP metadata URL or manually provide the IdP entity ID, SSO URL,
and signing certificate.
Service provider details
Provide these values to your IdP when registering Truthlocks:| Field | Value |
|---|---|
| SP Entity ID | urn:truthlocks:<your_tenant_id> |
| ACS URL | https://console.truthlocks.com/api/auth/saml/acs |
| NameID format | urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress |
| Binding | HTTP-POST |
IdP configuration fields
When creating a SAML connection in the console, you can configure your IdP in two ways:Option A: metadata URL
Provide your IdP metadata URL and Truthlocks automatically fetches the entity ID, SSO URL, and signing certificate.Option B: manual configuration
| Field | Description |
|---|---|
| IdP Entity ID | Your identity provider’s unique identifier |
| IdP SSO URL | The URL where Truthlocks sends SAML authentication requests |
| IdP Certificate | The X.509 signing certificate from your IdP (PEM format) |
Creating a connection via the API
idp_metadata_url and provide idp_entity_id, idp_sso_url, and idp_certificate instead.
Role mapping
Truthlocks maps IdP group assertions to internal roles during sign-in. Two modes are available:| Mode | Behavior |
|---|---|
STATIC | All SAML users receive a fixed default role (e.g., viewer) |
GROUPS | IdP group names are mapped to Truthlocks roles (admin, editor, auditor) automatically |
User provisioning
When a user authenticates via SAML for the first time, Truthlocks automatically creates their account using attributes from the SAML assertion (email, first name, last name). This is called just-in-time (JIT) provisioning. For bulk user sync and deprovisioning, use SCIM provisioning.Session details
- Sessions last 12 hours after SAML login.
- Session cookies are
HttpOnlyandSameSite=Lax. - A 2-minute clock skew tolerance is applied when validating SAML assertions.
Testing a connection
After creating a SAML connection, test it before enabling for all users:Disabling SSO
To revert to standard email/password authentication:Related
- SCIM provisioning — Automate user and group sync from your IdP.
- RBAC & permissions — Understand the roles that SAML users are mapped to.
- Authentication — API key and JWT authentication methods.
