Skip to content

Integrate OneLogin

How to integrate OneLogin SAML/SSO with Tallyfy

In order to integrate OneLogin SAML/SSO with your Tallyfy organization, you will need to:

  1. Set up and configure a OneLogin app with SAML support.
  2. Use the OneLogin app’s settings to configure SAML on Tallyfy.
  3. Enable SAML for your organization on Tallyfy to start SSO authentication and user provisioning.

Creating a OneLogin app for your Tallyfy organization:

  • Open the Administration menu and go to Applications > Applications page.
  • Click Add App.
image
  • Search for SAML Test Connector and select the SAML Test Connector (Advanced) app.

  • Edit the Display Name and click Save.

image

Configuring SAML settings

First we will need to get the default SAML values from our organization in Tallyfy:

  • Select our Organization’s profile from the Support page.
  • Scroll to Org Settings tab:
image
  • Click on Add Configuration Details: Ignore the empty fields for now and scroll down to the existing default values.
image
  1. Now, we will fill the SAML settings in OneLogin, using those values.

  2. Go back to your OneLogin app connector page, Click on Configuration tab

  • ACS (Consumer) URL: In this field, copy the value from SP ACS URL (Single Sign On URL) - number 1 in the screenshot above
  • Recipient: The same URL as SP ACS URL (Single Sign On URL).
  • Audience (EntityID): copy the value from SP Entity ID (Audience URI) - number 2 in the screenshot above
  • Set ACS (Consumer) URL Validator to:
image
  • Leave everything else the same and click on Save.

Adding parameters needed by Tallyfy

  • Select the Access tab from the app connector page.
  • You will need to add three parameters just like the screenshot below:
image
  • Click on the + button on the top-right side of the table.

  • Fill the form with the correct values for each field (like the previous screenshot Email, FirstName and LastName).

image image

Adding users to your app connector

  • With your app connector open, select the Access tab.
  • Ensure that the settings give you access to the app connector. For example, enable a role that will give you access. In this case, let’s say that the selected Default role grants access to relevant users:
image
  • Click Save

Configuring SAML on Tallyfy

  • Since you have an app Connector ready, first we will get the data needed to configure SAML on Tallyfy.
  • Click on the SSO tab in your app Connector page:
image
  • We will use the values in the above page as SAML configs to integrate this app to our Tallyfy organization.
  • Go back to our Tallyfy Support page where the SAML configs modal is still open, then we fill the values respectively, as shown in the screenshot below. This step will be done by Tallyfy Support - so email us if you need on support (at) tallyfy (dot) com.
image
  • After successfully saving the configs, you will need to enable SAML in this organization.

  • Click on the toggle button next to Add Configuration Details:

image

Provisioning new members to Tallyfy using SSO:

  • Copy the Tallyfy Login URL from the SAML config modal in Tallyfy Support.
image
  • Share the URL with your users who have access to the OneLogin app Connector.

  • Existing users can log in using the link, while new users will be automatically added to your Tallyfy organization.

That’s all - the login URL is all your users need to sign in and also get provisioned.

Authentication > Integrate Okta

SAML/SSO integration between Okta and Tallyfy enables single sign-on authentication and automatic user provisioning through configuration of app settings and exchange of SAML parameters between both platforms.

Authentication > Integrate Azure AD

Azure AD SAML/SSO integration with Tallyfy enables single sign-on authentication and automatic user provisioning through configuration of an Azure AD app and SAML settings exchange between both platforms.

Authentication > Integrate Google Suite

Setting up Google Suite SAML/SSO integration with Tallyfy involves configuring app settings in the Google Admin console and exchanging SAML data between platforms to enable single sign-on and automatic user provisioning.