SSO gives your team members access to Catalytic through their Identify Provider (IdP) account. SSO is configured from the Admin Team Center. SSO Settings can only be accessed by Admin users and are enabled per team.
Catalytic uses SAML 2.0 for SSO and a self signed certificate for SAML assertion encryption. We also support CA signed certificates if your SSO implementation requires it—contact Catalytic Support to get this set up for your organization.
During setup, configure your Identity Provider to use the user’s email address as the NameID. Catalytic does not support any custom attributes and any custom attributes passed to Catalytic will be ignored.
Catalytic does not have built-in support for Two Factor Authentication (2FA). To require 2FA for users logging into your team, use an Identity Provider (IDP) that has 2FA enabled.
We use a self signed certificate for SAML which is provided in the metadata downloadable from the SSO page.
Set up a connection with your identity provider using the configuration settings below, then configure SSO in Catalytic.
To make sure implementation is seamless, Catalytic can test your SSO configuration in a testing environment before implementing it in production. Contact Catalytic Support if you’re interested in testing SSO.
To configure SSO, you first create a connection within your IdP using information from Catalytic. Set up requires a unique ACS URL and Entity ID, which Catalytic provides from the SSO Settings page.
Follow the steps supplied by your IdP to configure a connector for Catalytic. Your IdP may support uploading a metadata file to expedite SSO setup. If so, you can Download the Metadata and upload it to your IdP to prepopulate the required fields.
After creating the connection, finish the setup in Catalytic. An Entity ID, Login URL, and Signing Certificate is required. Your IdP should provide these after completing step 1.
From the SSO Settings page, select Enable Single Sign-On
Fill out all required fields.
💡Tip: Your IdP may provide a downloadable metadata file to expedite SSO setup. Look for this file during configuration and upload it into the Metadata file field to prepopulate the required fields.
Once SSO is configured, select . Then flip the in the top right. Return to this page to edit your configuration at any time.
When SSO is enabled for a team, SSO is the only authentication method allowed and users can no longer log in using their Catalytic password. Any changes to the SSO settings will affect your team immediately.
Catalytic does not support user provisioning with SAML 2.0. After configuring SSO, you’ll continue to create, update and deactivate Catalytic users within Catalytic, either manually from the Team Page or by building a user provisioning process using actions like: Workflow: Create a User, Workflow: Update a User, Workflow: Deactivate a User
SLO lets your IdP control the log out parameters for users. Catalytic does not support Single Logout (SLO). Users who authenticated using SSO will stay logged in until their Catalytic session expires.
If a user attempts to log out of Catalytic, they will go through the SSO login flow. If their user is authorized to use Catalytic by the IdP, they will be re-authenticated. If their access to Catalytic has been revoked in the IdP, they will be logged out.
If something’s not working as expected, or you’re looking for suggestions, check through the options below.
Users in Catalytic who are provisioned in your IdP will stay logged in, or may be asked to log in through their SSO account.
Users in Catalytic who are not provisioned in your IdP are logged out. Depending on your IdP, unprovisioned users are redirected to a splash page that explains they do not have access. In some cases this may not happen until they refresh their browser or log out.