TABLE OF CONTENTS
- What is Single Sign-On (SSO)
- Is it a paid-for feature?
- Who Can Configure SSO
- How to Configure SSO
- Before you start
- Step 0 (in Atlas) – Open the SSO configuration wizard in Atlas
- Step 1 (in Atlas) – Configure Name & Select Protocol
- Step 2.1 (in Atlas) – Get Atlas SSO Endpoints
- Step 2.2 (in IdP console) – Set up the Atlas app in your identity provider (IdP)
- Step 3 (in Atlas) – Configure Service Provider (get metadata, URLs, certificate from your IdP)
- Step 4 (in Atlas) – Map user attributes
- Step 5 (in Atlas) – Additional Settings
- Step 6 (in Atlas) – Test the SSO connection
- Troubleshooting
What is Single Sign-On (SSO)
Single Sign-On (SSO) allows users to access Atlas using their existing corporate credentials instead of a separate Atlas-specific username and password. Atlas supports logging in with your normal corporate credentials through your organisation’s identity provider (IdP), such as Microsoft Entra ID (Azure AD), Okta, or Google Workspace.
Some terms you will see: Service Provider (SP) – Atlas is the system users are logging into. Identity Provider (IdP) – The system that confirms who the user is (for example Google Workspace, Azure AD / Entra ID, Okta). SAML 2.0 – The technical standard that lets the IdP and Atlas talk to each other. You don’t need to know the details, but both sides need matching settings.
Is it a paid-for feature?
Yes, this is something that needs to be purchased. Please get in touch with your Customer Development Manager for more details.
Who Can Configure SSO
Any user with one of the following profiles will automatically have access to configure SSO:
- Training Service Owner
- Training Admin
How to Configure SSO
Before you start
Make sure you have:
An Atlas account with SSO configuration rights
Your Atlas account must have permission to configure SSO (for example, it has a “can configure SSO” permission).Admin access to your SSO system
You must be able to create or edit an SSO / SAML application in your identity provider (IdP), such as:Google Workspace (Google Admin console)
Azure AD / Entra ID
Okta
Auth0
Or another SAML 2.0‑compatible system
A clear idea of who should use SSO
Decide which users or groups should be allowed to log into Atlas using SSO.
Step 0 (in Atlas) – Open the SSO configuration wizard in Atlas
Log in to Atlas
Go to Single Sign On from the menu in the left.
Click "Add identy provider" button.
Step 1 (in Atlas) – Configure Name & Select Protocol
When asked for a Configuration name, use something clear, for example:
“Google Workspace SSO”
“Azure AD SSO”
“Okta SSO”
If asked for the protocol, choose SAML 2.0.
Once done, click Next.
Step 2.1 (in Atlas) – Get Atlas SSO Endpoints
Here Atlas will show you some URLs that you must copy into your IdP:
User Login URL
Assertion Consumer Service (ACS) URL
Entity ID/ Metadata URL
Keep this page open or copy these values somewhere safe and secure, as you will need to paste these values in your IdP admin console in the next step.
Step 2.2 (in IdP console) – Set up the Atlas app in your identity provider (IdP)
Now you need to create or edit the SSO / SAML app on your IdP side, using the values you just got from Atlas.
1. Create or select the SAML application
Sign in to your IdP admin area.
Go to where you manage applications or SSO integrations. For example:
Google Workspace: Apps → Web and mobile apps
Azure AD / Entra ID: Enterprise applications
Okta: Applications
Auth0: Applications
Create a new SAML / SAML 2.0 application for Atlas, or open an existing one if it has already been created.
Give it a clear name, such as “Atlas SAML SSO”.
2. Add the Atlas details to the IdP
In the SAML settings for the app you just created:
Find the fields related to the Service Provider or SP.
Enter the values from the Atlas SSO wizard:
Assertion Consumer Service (ACS) URL / Single Sign On URL
Paste the Single Sign On URL from Atlas.
Audience URI / Entity ID
Paste the Audience / Entity ID from Atlas.
Name ID format
If in doubt, set this to Email or EmailAddress, unless your Atlas documentation or admin tells you otherwise.
Name ID source
Normally this is the user’s primary email address or another unique identifier.
Save your changes in the IdP.
3. Configure which user details are sent (attributes / claims)
Atlas needs some basic user information to identify people.
In your IdP SAML settings:
Find where you configure attributes, claims, or mappings for the SAML app.
Make sure you are sending at least:
Email address
First name
Last name
Use simple, clear attribute names so you can map them easily in Atlas. Common examples:
email
given_name (first name)
family_name (last name)
Optionally, you can also send other details like department, role, or phone number, if your organisation or Atlas setup needs them.
Save the attribute / claim configuration.
4. Allow the right users to use the Atlas app
In your IdP, assign the Atlas SAML application to the right users or groups (for example, “All staff” or a specific department).
Make sure at least one test user account (that you can log in with) has access to the app.
Step 3 (in Atlas) – Configure Service Provider (get metadata, URLs, certificate from your IdP)
In your IdP app for Atlas, find the section for SAML metadata or IdP metadata. This may allow you to:
Download a metadata XML file, or
Copy individual values such as:
IdP SSO URL (sometimes called SAML login URL or Single Sign On URL)
Entity ID / Issuer for the IdP
Signing certificate
Copy paste this information into relevant fields in Atlas.
If Atlas asks for a logout URL, add it if your IdP supports SAML logout for this app. If you are not sure, it is usually safe to leave it blank or follow your admin’s instructions.
Once done, click Next.
Step 4 (in Atlas) – Map user attributes
Now tell Atlas which SAML attributes match which user fields.
You can choose default or custom attribute mapping. For cutom mapping, in the User attribute mapping step in Atlas:
Map the attribute that contains the email address (for example email) to the Atlas email field.
Map the attribute that contains the first name (for example given_name) to the Atlas first name field.
Map the attribute that contains the last name (for example family_name) to the Atlas last name field.
If Atlas shows optional fields like phone number or department, you can map them if you are sending those attributes from the IdP, or leave them blank.
Make sure all required fields are mapped.
Save your mappings and complete the wizard.
When you are done, click Next. check that Atlas confirms the configuration has been saved without errors.
Step 5 (in Atlas) – Additional Settings
Here you can set up the following rules:
Just‑in‑Time (JIT) provisioning:
Let Atlas Hub automatically create a user account the first time someone signs in via your SSO provider, using their SSO profile details.Force SSO:
Require everyone to log in only through SSO, so users aren’t given the option to sign in with separate Atlas Hub credentials.
Once done, click Save.
Step 6 (in Atlas) – Test the SSO connection
- On the Atlas SSO configuration page, find the Identity Provider (IdP) you just added.
- In the Action column for this IdP, click the (...) menu and select Test connection.
- Start the test.
Atlas redirects you to your IdP’s login page for the Atlas app.
You sign in using your test user account (which already has access to the Atlas app in the IdP).
After logging in, you are redirected back to Atlas.
Atlas displays a message confirming that the connection test was successful.
If all of this works, your SSO trust and user attribute mappings are very likely configured correctly.
Troubleshooting
If the test fails or users cannot log in with SSO, check the following:
Endpoint values
Make sure the Single Sign On / ACS URL and Audience / Entity ID in your IdP match exactly what Atlas shows in the SSO endpoints step.IdP details in Atlas
Confirm the IdP SSO URL, Entity ID / Issuer, and certificate in Atlas are correct and up to date.User access
Check that users exist in both systems - your IdP and Atlas with matching emails or identifiers.Attribute names and mappings
Make sure the attribute names you set in the IdP (for example email, given_name, family_name) match the ones you chose in the Atlas attribute mapping step.Error messages and logs
Look at any error messages shown in Atlas and in your IdP’s SSO / SAML logs. They often point you towards whether the problem is with:URLs / endpoints
Certificates
Attributes / claims
If you still cannot solve the issue:
Share the error messages and log snippets (without sensitive information) with:
Your internal IT / administrator, or
Atlas support.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article