Introduction
This guide explains about configuring Single
Before You Begin
Access Requirements
You need admin privileges for the Sanas Portal and your Identity Provider (IdP) account.
User Management
Ensure all intended users are added to Sanas and assigned to a workspace. Unassigned users will fail authentication when attempting to log in via SSO.
Supported Identity Providers
We’re continuously enhancing our integrations and may support additional IdPs in future.
Okta
Azure Active Directory (AD)
Configuring SSO on Sanas Portal
Gather Required Details from Sanas Portal.
Log in to the Sanas Portal with your admin credentials.
Navigate to the Settings menu.
Click Manage, under the Portal Authentication.
Enable the SSO option if it’s disabled.
Copy and securely save the following values. We will need these details later to configure your IdP:
Identifier
Reply URL (Assertion Consumer Service URL)
Create a SAML Application in Okta.
Log in to your Okta account.
In Okta, navigate to Applications > Applications and click Create App Integration.
Select SAML 2.0 as the sign-in method, then click Next.
Fill in the application details and click Next:
Note: These values will be visible on Sanas Portal to users logging in via SSO.
App Name: Enter an app name (e.g., "Sanas Portal").
App Logo: Upload your desired logo (optional).
In SAML Settings, enter the following:
Single Sign-On URL: Paste the Reply URL you copied from Step 1.
Audience URI: Paste the Identifier you copied from Step 1.
Name ID Format: Set to EmailAddress.
Application Username: Set to Okta username.
Under Attribute Statements, configure the following mappings:
username:
user.login
name:
user.firstName + " " + user.lastName
(Optional) sanasTeam:
user.sanasTeam
sanasUserType:
user.sanasUserType
Select This is an internal app that we have created, then click Finish.
Retrieve SSO Details from Okta
Open the newly created SAML application in Okta.
Navigate to the Sign On tab and copy the Sign on URL. Save it securely — you’ll need it to complete the Sanas configuration.
In the SAML Signing Certificates section, click the Actions button next to SHA-2 and select Download certificate.
Complete SSO Configuration in Sanas Portal
Return to the SSO Settings page in the Sanas Portal.
Paste the Sign on URL (from Step 3.b) into the Identity Provider Single Sign-On URL field.
Upload the X.509 certificate downloaded in Step 3.c.
Click Save. A success message will confirm that SSO has been configured.
Perform a test login to ensure SSO is working correctly.
User Management on Okta
Ensure all Sanas admin users are added to your Okta directory to avoid authentication errors.
Troubleshooting
If you encounter issues during configuration or login, refer to our SSO Troubleshooting Guide.
Support
Need help? get in touch with our Support Team for assistance.