License requirements:
SAML SSO is only supported on the Deployment Enterprise and Data Backup Enterprise tiers.
This article is specific to OneLogin, we have more general documentation which can be applied to other providers as well.
β
π Critical Considerations Before You Begin
β
1. New Accounts are Created: SAML user accounts are new, distinct accounts. They cannot be linked to your existing login methods (e.g., Google, Salesforce). This means existing connections, jobs, and settings will not transfer and will need to be recreated.
β
2. Prevent Admin Lockout: You must ensure that at least one Team Owner maintains a non-SAML login method. This acts as a failsafe to prevent the entire team from being locked out of administrative settings if the SAML integration fails.
β
We are going to switch between the OneLogin Administration page and Gearset Single sign-on settings page all through this document.
β
Go to the OneLogin Administration page. Select Applications -> Applications from the top menu navigation bar
β
Click Add App -> SAML Custom Connector (Advanced)
Give the App a new name, for example Gearset App and give the app a description. You can also upload portal Icons that you wish to use for this app. Then click Save
β
β
Once saved, click Configuration on the left hand side.
β
Configuration section
Before filling out this section we should login to Gearset and go to the Gearset Single Sign-on settings page - we will be using the Login URL and Gearset Information sections here.
β
β
Now go back to the OneLogin App configuration section and fill in the fields using the table below.
Field | Value | Comments |
RelayState | Leave blank | Gearset ignores an IdP-Initiated RelayState |
Audience (EntityID) | Copy and paste the Entity ID from the Gearset Information section. |
|
Recipient | Copy and paste the Assertion Consumer Service (ACS) URL from the Gearset Information section. |
|
ACS (Consumer) URL validator* | Copy and paste the Assertion Consumer Service (ACS) URL from the Gearset Information section. |
|
ACS (Consumer) URL* | Copy and paste the Assertion Consumer Service (ACS) URL from the Gearset Information section. |
|
Single Logout URL | Leave blank |
|
Login URL | Either Leave blank or copy and paste the Login URL value from the Gearset Login URL section | This value will only be used if you set the SAML initiator to be ServiceProvider |
SAML not valid before | 3 |
|
SAML not valid after | 3 |
|
SAML initiator | OneLogin or ServiceProvider | If you want to do IdP initiated requests then keep this as OneLogin. If you want to be able to login from Gearset then change this to ServiceProvider |
SAML nameID format |
| |
SAML issuer type | Specific |
|
SAML signature element | Both |
|
Encrypt assertion | Unchecked | Gearset does not currently support encrypted assertions |
SAML encryption method | Leave as TRIPLEDES-CBC | Leave this as default. |
Send NameId Format in SLO Request | Unchecked | Gearset does not currently support SAML Single Logout. Logout via Gearset. |
Sign SLO Request | Unchecked | Gearset does not currently support SAML Single Logout. Logout via Gearset. |
Sign SLO Response | Unchecked | Gearset does not currently support SAML Single Logout. Logout via Gearset. |
SAML sessionNotOnOrAfter | 1440 | Leave this as default |
Parameters section
Next we can add parameters to the SAML response.
These are the values from the Additional Attributes section under the Gearset Information section.
You will be using NameId here so keep this as the default Email.
β
The other attributes are option however we recommend adding display name
β
β
SSO Section
OneLogin will pre-populate the X.509 Certificate with whatever is the Default certificate set under Security -> Certificates on the top navigation menu.
β
You can change the certificate used by selecting Change and selecting the required certificate from the drop down list.
When you have selected the desired certificate, right-click on View details and open in new tab/window. Copy the X.509 Certificate.
β
If you need to create a new certificate please follow the instructions given by OneLogin - Add new certificate
β
Open the Single Sign-on settings page in Gearset and navigate down to the Identity Provider section. Click the Edit configuration button and paste the certificate into the certificate field.
β
Map the other Identify Provider fields
OneLogin SSO setting | Gearset Identify Provider setting |
Issuer URL | Issuer URL |
SAML 2.0 Endpoint (HTTP) | Identity Provider Single sign-on URL |
OneLogin Settings
Gearset Identity Provider settings
Click the Save configuration button.
The Algorithm field will tell you the algorithm used in the supplied certificate.
β
Make sure you select the value for SAML Signature Algorithm that matches the algorithm used in the certificate.
If the SAML Signature Algorithm and Certificate Algorithm do not match then you will be unable to login to Gearset.
Save the Application in OneLogin.
β
You need to assign Users to the App before they can login or it will show in their portal.
β
β
β
β


















