# Workato Identity SAML-based SSO

SAML-based single sign-on (SSO) authentication enhances security when accessing Workato features and improves user experience.

SAML-based SSO enables you to add an identity provider (IdP) for authentication management. This adds robust security measures and reduces the risk of password-related breaches. Your organization can enforce SAML-based authentication to comply with internal security policies and regulatory requirements to ensure that only authorized users access sensitive data.

SAML-based SSO also streamlines the user experience by allowing users to sign in once and access multiple Workato features without separate logins. Additionally, it allows centralized management of user identities and access controls through your IdP to apply access policies consistently.

# SAML-based SSO key features

Workato Identity supports SAML-based SSO to provide the following key features:

  • Just-in-Time (JIT) Provisioning

  • You can enable JIT provisioning to automatically create user accounts when they first sign in through SSO. This eliminates the need for administrators to manually create accounts and keeps user information current.

  • Customizable attributes

  • You can configure both your Identity Provider (IdP) and Service Provider (SP) to sync user group information using SAML attributes, such as group memberships.

  • Selective enforcement

  • Your organization can choose to enforce SAML-based authentication for all users or add users manually. This option supports compliance requirements while allowing flexibility for development and testing.

# SAML-based SSO workflow

Your IdP and Workato Identity exchange SAML metadata to enable SAML-based SSO authentication. You must set up a SAML application in your IdP with specific values, such as the single sign-on URL and metadata URL. You can also configure user group syncing.

SSO configuration can vary based on your specific IdP. Refer to the Enforce SAML-based SSO authentication for Okta guide to learn how to enable this capability for Okta. This guide includes instructions for enabling user groups sync, which allows you to sync group assignments between the Workflow apps portal and your IdP.

flowchart TD A(User attempts to <br/> access Workato) --> B(Workato generates <br/> SAML authentication request) B --> C(User is redirected <br/> to IdP login page) C --> D{{Is the user <br/> authenticated <br/> with the IdP?}} D -->|No| E(User enters <br/> credentials in IdP) E --> F(IdP validates <br/> credentials) F --> D D -->|Yes| G(IdP generates <br/> signed SAML assertion) G --> H(SAML assertion sent <br/> to Workato through a <br/> browser redirect) H --> I(Workato validates <br/> assertion using <br/> X.509 certificate) I --> J{{Does the user <br/> exist in Workato?}} J -->|No| K(New user account <br/> created automatically) K --> L(User profile populated <br/> from SAML attributes) L --> M(User granted access <br/> to environments) J -->|Yes| N(Existing permissions <br/> and group memberships <br/> preserved) N --> O(User authenticated <br/> and session started) M --> O classDef default fill:#67eadd,stroke:#67eadd,stroke-width:2px,color:#000; classDef WorkatoBlue fill:#5159f6,stroke:#5159f6,stroke-width:2px,color:#fff; classDef SubgraphDash fill:#e1fffc,stroke:#f66,stroke-width:2px,color:#000,stroke-dasharray: 5 5 classDef Success fill:#67eadd,stroke:#2ecc71,stroke-width:2px,color:#000; class A,C,E,K,L,M,F SubgraphDash class D,J WorkatoBlue

# Configure SAML-based authentication

Complete the following steps to configure SAML-based authentication in Workato Identity:

NOT FOR WORKFLOW APPS SAML-BASED SSO

This documentation is specific to Workato Identity. Refer to SAML-based single sign-on authentication and Enforce SAML-based SSO authentication for Okta to configure SAML authentication for Workflow apps.

1

Sign in to your Workato account and go to Workspace admin.

2

Click Authentication & Groups in the sidebar.

3

Select the environment you plan to configure. The environment End-user group page displays by default.

ENVIRONMENT AVAILABILITY

Workspaces without Environments provisioned only have one environment available.

4

Select the Authentication tab.

5

Ensure that the SAML-based SSO authentication toggle is enabled.

SAML toggleEnsure the SAML-based SSO authentication toggle is enabled

6

Go to the Select an identity provider (IdP) section and click + Set up new provider.

7

Provide a name for your IdP in the Identity provider (IdP) name field. For example: Okta Prod.

Configure SAML authenticationConfigure SAML authentication

8

Use the Enforce SAML authentication for drop-down menu to select who is required to use SAML-based authentication.

9

Copy the Specify Single sign-on URL and Service provider (SP) entity ID values.

10

Go to the Do you have your identity provider metadata URL? section and select the option that applies to you.

11

Click Set up.

# Configure IdP user access

You must configure your IdP to send the required user attributes in its SAML assertions after you complete the SAML-based SSO configuration. Workato uses these attributes to populate user profiles and manage group memberships.

Add the following attributes to your IdP's SAML attribute statements:

Name Value Description
workato_end_user_name user.displayName Maps the user's display name from your IdP to their Workato profile.
workato_end_user_groups appuser.workato_end_user_groups Maps the user's group memberships from your IdP to Workato. Required only if you plan to enable user group syncing.

Refer to Okta SAML configuration for a step-by-step guide on how to configure SAML and SAML attribute statements in Okta.


Last updated: 3/12/2026, 5:20:57 PM