Single sign-on (SSO) with SAML 2.0 via OneLogin
3min readLast updated: January 18, 2025

testmail.app supports SAML 2.0 for Single Sign-On (SSO), allowing users to seamlessly log in to testmail.app without needing to create a separate account. If you are using OneLogin as your Identity Provider, you can connect your testmail.app organization to OneLogin to set up Single Sign-On. This guide will walk you through the steps to set up SSO via OneLogin.

This feature is only available for enterprise customers.

Setting up Application in OneLogin

Sign in to your OneLogin account as an administrator. Navigate to Applications → Add AppSearch for SAML and select SAML Custom Connector (Advanced) from the list. Name the app Testmail App and upload your logo and save the App.

SAML Configuration

The following settings should be configured in OneLogin to setup SAML 2.0:

  1. Audience:
https://testmail.app

This URL should match the Audience URI in Testmail SAML configuration.

  1. Recipient:
https://sso.testmail.app/saml
  1. ACS (Consumer) URL Validator:
^https:\/\/sso\.testmail\.app\/saml$
  1. ACS (Consumer) URL:
https://sso.testmail.app/saml

Other fields are optional. The configuration should look similar to the screenshot below:

  1. SAML signature element:
    Select Both as the SAML signature element
  1. Parameters:
    Navigate to parameters tab (available at the left panel). To add parameters click on the + (Add) symbol.

It is mandatory to set the below parameters with the same field-name mentioned (case sensitive).

  • id
    Check the Include in SAML assertion flag and click save. The value should be a unique descriptor for the user (Can be UUID/email or any other field).
  • name
    Check the Include in SAML assertion flag and click save. Set the value to Name.
  • email
    Check the Include in SAML assertion flag and click save. Set the value to Email.
  • role (Optional)
    If you wish to pass the role for the user, you can set this field to either "Member" or "Admin." Note: If no role is passed, the user will be assigned the "Member" role by default.
  1. SAML Signature Algorithm:
    Navigate to SSO tab (available at the left panel) and set the SAML Signature Algorithm as SHA-256

Integrating in testmail.app

Navigate to your console → Settings →  Setup single-sign-on (SSO) with SAML 2.0.

After configuring the required fields, your SSO setup will be submitted for review. Our technical team will verify the settings, and you will receive an email notification once the integration is activated.
  1. IDP entity ID (Issuer URL):
    Copy the Issuer URL.
  2. SP Entity ID (Audience URI):
https://testmail.app
  1. X509 Certificate:
    To get the certificate, click on view details and copy it.
  1. Remote Login URL:
    Copy the SAML 2.0 Endpoint (HTTP).
  2. Allowed Domains: Configure the domains according to your organization to implement Single Sign-On (SSO) for those domains. Note: If SAML Single-Sign-On is enabled and new domains are added in the future, they will be placed under review. Your current SSO setup will remain active for the existing domains.
  3. Click Save Configuration:
    Upon clicking, a confirmation message will pop up stating that your settings are saved and under review, and our technical team has been notified.

Need help?

Please feel free to reach out at [email protected] for any help regarding SAML integration for Single-Sign-On via OneLogin.

Related articles

Integrate SCIM to Automate User Provisioning

If you have an existing user directory, you can use SCIM to automatically provision users to your testmail.app organization. This allows you to manage users in your user directory and reflect those changes automatically in testmail.app. This feature is only available for enterprise customers. Setting up SCIM in testmail.app Navigate to your console → Settings →  SSO Configuration → Setup auto-provisioning of users using SCIM. SAML SSO must be enabled to use SCIM for auto-provisioning. Afte

5min read

Single sign-on (SSO) with SAML 2.0 via Microsoft Entra ID (Azure AD)

testmail.app supports Single Sign-On (SSO) via Microsoft Entra ID (Azure AD) through our SAML 2.0 integration. You can seamlessly connect testmail.app with Entra ID using this protocol. This feature is only available for enterprise customers. Setup the application in Microsoft Entra ID * Sign in to your Azure account. Navigate to Microsoft Entra ID → Add → Enterprise Application. * Click on Create your own application. Enter a name for the application, select Integrate any other... and the

3min read

Single sign-on (SSO) with SAML 2.0 via Okta

testmail.app supports Single Sign-On (SSO) using SAML 2.0. If you are using Okta as your Identity Provider (IdP), you can enable your users to sign in to their organization on testmail.app through our Single Sign-On mechanism. This guide will help you configure Single Sign-On using SAML 2.0 for your testmail.app organization with Okta. This feature is only available for enterprise customers. Application setup in Okta You have to add a new application (Testmail App) in your IdP that uses SAML

2min read