Skip to main content
SAML via Azure AD

Streamline access management with SAML authentication via Azure AD.

Updated over 3 weeks ago

What Is SAML?

SAML is an important security standard that allows Taskade users to log in securely without remembering and managing multiple passwords. SAML can be set up with Okta, Azure AD, Google Workspace, and other identity providers. Follow the instructions below to configure SAML for your organization.

πŸ’‘ Note: If your team is already using Taskade, your identity provider will take ownership of those accounts. Please inform your team before enabling SAML.


Configure with Azure AD

Requirements

  • Important: This should be configured by your IT department.
    ​

  • The main account must be set up with a company email address.
    ​

  • Personal email accounts are not allowed.
    ​

  • Your email must be verified.
    ​

  • This feature is only available on our Ultimate and Enterprise plans.


1) Create an Organization

In order to manage multiple workspaces and enable group provisioning, you need to create an organization on the Settings page of your Taskade account.

  • Click the gear βš™ button in the left sidebar.
    ​

  • Under Organization, click βž• Create organization.
    ​

  • Enter the name of your organization and click Create.

step_2.png


2) Configure Azure

Next, navigate to your Azure Portal and follow the steps below:

step_1.png

step_2.png

step_3.png

step_4.png

As of this moment, Taskade is not available in the Azure AD gallery. In the Create your own application menu, select Integrate any other application you don't find in the gallery. When you're done, click Create at the bottom of the panel.

step_5.png

The next step is configuring the Single sign-on for the newly added application.

step_6.png

Make sure to select SAML as the authentication method.

step_7.png

step_8.png


3) Set Up SAML Certificate

In the Basic SAML Configuration panel, use the following values:

Identifier (Entity ID)

Reply URL (Assertion Consumer Service URL)

Sign-on URL (Optional)

step_9.png

Click Save at the top left corner of the Basic SAML Configuration panel. Next, scroll down to SAML Certificates and click Edit.

step_10.png

You have to create a new certificate and use the Sign SAML response and assertion option for the Signing Option. Click Save to create the certificate.

In the next step, you will need to activate the new certificate.

Click the three dots (Β·Β·Β·) on the right and select Make certificate active. Finally, download the Base64 certification. You will need the certificate in the next step.,

step_12.png

Close the SAML Signing Certificate panel and scroll to Set up Taskade (step 4) of the Single Sign-On configuration page.

step_13.png

You will need to copy these values to Taskade, so keep this window open and navigate back to your organization.


4) Finish Setup in Taskade

In the SAML SSO page, paste the SSO URL, IDP Issuer, and the Base64 Certificate from the previous step. You can open the certificate file with any text editor.

  • Type your company website in the DOMAIN field (1)
    ​

  • For other fields, use the details from the table below.

Taskade

Azure AD

2

Login URL

SSO URL

3

Azure AD Identifier

IDP Issuer

4

Base64 Certificate (copy using a text editor)

IDP Public Signing Cert

❗️ Important: You must select 1 default workspace. When your team authenticates via SSO, they can access the default workspace's home folder. Treat the home folder as a lobby for your team. Access to all other folders within your workspace requires manual invites or changing team access.

Once you're done, scroll down and click Save. If you've experienced any errors up until this point, please email us at [email protected].

The last and final step is to ensure your Single Sign-On has been configured correctly. Navigate to your Azure Portal and click Test under the Test single sign-on with Taskade. Then click Test sign in as the current user.

step_15.png

step_16.png

You'll be redirected to https://www.taskade.com/saml/sso where you'll log in using your Azure credentials. If the test is successful, anyone in your Active Directory assigned to the application can sign up or sign in to Taskade.

If you require further assistance with this configuration, please email us at [email protected], and we'll be more than happy to help set this up for you.


😊 Helpful Links

πŸ€– Taskade AI Essentials

Did this answer your question?