๐ค What Is SAML?
SAML is an important security standard that allows Taskade users to log in securely without remembering and managing multiple passwords. SAML can be set up with Okta, Azure AD, Google Workspace, and other identity providers. Follow the instructions below to configure SAML for your organization.
๐ ๏ธ Configure with Azure AD
-
Requirements
- Important: This should be configured by your IT department.
- The main account must be set up with a company email address.
- Personal email accounts are not allowed.
- Your email must be verified.
- This feature is only available on our Ultimate and Enterprise plans.
The first step is to create an organization available on the settings page. An organization allows you to manage multiple workspaces and enables group provisioning.
After creating your organization on Taskade, navigate to your Azure Portal and follow the steps below:
As of this moment, Taskade is not available in the Azure AD gallery. In the Create your own application menu, select Integrate any other application you don't find in the gallery. When you're done, click Create at the bottom of the panel.
The next step is configuring the Single sign-on for the newly added application.
Make sure to select SAML as the authentication method.
In the Basic SAML Configuration panel, use the following values:
Identifier (Entity ID) | https://www.taskade.com/saml/sso/metadata |
Reply URL (Assertion Consumer Service URL) | https://www.taskade.com/saml/sso/callback |
Sign-on URL (Optional) | https://www.taskade.com/saml/sso |
Click Save at the top left corner of the Basic SAML Configuration panel. Next, scroll down to SAML Certificates and click Edit.
You have to create a new certificate and use the Sign SAML response and assertion option for the Signing Option. Click Save to create the certificate.
In the next step, you will need to activate the new certificate.
Click the three dots (ยทยทยท) on the right and select Make certificate active. Finally, download the Base64 certification. You will need the certificate in the next step.,
Close the SAML Signing Certificate panel and scroll to Set up Taskade (step 4) of the Single Sign-On configuration page.
You will need to copy these values to Taskade, so keep this window open and navigate back to your organization. In the SAML SSO page, paste the SSO URL, IDP Issuer, and the Base64 Certificate from the previous step. You can open the certificate file with any text editor.
Azure AD | Taskade |
Login URL | SSO URL |
Azure AD Identifier | IDP Issuer |
Base64 Certificate (copy using a text editor) | IDP Public Signing Cert |
Once you're done, scroll down and click Save. If you've experienced any errors up until this point, please email us at support@taskade.com.
The last and final step is to ensure your Single Sign-On has been configured correctly. Navigate to your Azure Portal and click Test under the Test single sign-on with Taskade. Then click Test sign in as the current user.
You'll be redirected to https://www.taskade.com/saml/sso where you'll log in using your Azure credentials. If the test is successful, anyone in your Active Directory assigned to the application can sign up or sign in to Taskade.
If you require further assistance with this configuration, please email us at support@taskade.com, and we'll be more than happy to help set this up for you.
๐ฏ Get Our Apps
- ๐ค Android app: Google Play Store
- ๐ iPhone app: Apple App Store
- ๐ฆ Firefox Extension: Firefox Add-Ons
- ๐ฉโ๐ป Chrome Extension: Chrome Web Store
- ๐ป Mac, Linux, Windows apps: taskade.com/downloads
๐ Questions or Suggestions?
- ๐ Our Official Blog: blog.taskade.com
- ๐ Taskade Updates: taskade.com/v/B1Q8lMxIfG
- โ๏ธ Contact Us: taskade.com/contact
- ๐ง Follow Us: twitter.com/taskade
- ๐ฃ๏ธ Feedback Channel: taskade.com/feedback
Use Taskade with your team to start collaborating right away! Chat, organize, and get things done, together.