Single Sign-On (SSO) through OneLogin (SAML)

Learn how to set up Single Sign-On (SSO) with OpenText Core SCA through OneLogin.

circle-info

This feature is currently only available for SCA Enterprisearrow-up-right customers.

You can set up Security Assertion Markup Language (SAML) Single Sign-On (SSO) with OneLogin to let users authenticate through their organization’s identity provider rather than maintaining separate application credentials. Once configured, users can securely access the application using their corporate accounts, while administrators retain centralized control over authentication and access management.

Supported features

  • Single Sign-On (SAML) initiated through OneLogin

  • Automatic account creation in OpenText Core SCA on initial sign-on

Requirements

  • The OneLogin Single Sign-On integration is only available for the Enterprise customers.

  • To complete the integration, you must:

    • Have a OneLogin account with administrator rights.

Configuration

To configure your SSO integration with OneLogin, follow these steps:

Service Provider (SP) details

Enter the following details in OneLogin when setting up the SAML application:

Parameter
Value

Single Sign-On URL (ACS URL)

https://debricked.com/app/sso/saml/acs

Audience URI (Entity ID)

https://debricked.com/app/sso/saml/metadata/{Employer_id} (Refer to the OpenText Core SCA's metadata file for the employer ID)

Application username

Email

Configure the application in OneLogin

  1. In the OneLogin admin page, click the Applications tab.

  2. Click Add App.

  3. Search for SAML Custom Connector (Advanced).

  4. Enter an application name, then click Next.

  5. Under Configuration, enter the ACS URL and Entity ID.

  6. Save the application.

Configure SAML parameters

Navigate to the Parameters section and create the following mappings:

Field
Value

email

Email

fname

First Name

lname

Last Name

circle-info

Set the email as NameID if required.

Retrieve Identity Provider metadata

After creating the app:

  1. In the Onelogin admin page, open the newly created application.

  2. Navigate to the SSO tab.

  3. Locate the SAML 2.0 Endpoint (HTTP) section.

  4. Click View Details.

  5. Download the IdP Metadata XML file.

Share this metadata into the Support team or use the https://debricked.com/api/1.0/open/sso/saml/request API endpoint to post the request along with the other required details.

Sample payload

Troubleshooting

If you run into issues while setting up or signing in with OneLogin, try the following checks:

Verify configuration

  • Make sure the ACS (Assertion Consumer Service) URL matches exactly with the value provided in OpenText Core SCA.

  • Confirm the Entity ID or Audience URI matches the value expected by OpenText Core SCA.

  • Verify that the correct users or groups are assigned to the application in OneLogin.

  • Make sure the SAML binding is set to HTTP-POST.

circle-info

Even small inconsistencies such as extra slashes, an incorrect employer ID, or a mismatched domain can cause SAML authentication to fail.

Check email matching

  • The email in the SAML assertion (NameID or mapped email attribute) must exactly match the user’s email in OpenText Core SCA.

  • Verify case sensitivity.

  • Ensure the user is in the correct organization.

  • Confirm the email domain is verified in OpenText Core SCA.

circle-info

Most “Unauthorized” errors stem from email mismatches.

Review attribute mapping

Ensure the required SAML attributes are properly mapped in OneLogin.

Required attributes

  • email

  • fname

  • lname

Recommended configuration

  • NameID Format: Email Address

  • NameID Mapping: Email

Common issues

  • Username sent instead of email

  • Missing required attributes

  • Incorrect attribute names

Inspect the SAML assertion

If the configuration looks correct, verify the actual SAML response:

  • Use a browser SAML tracing extension to capture and inspect the SAML assertion.

  • Check the following values in the SAML response:

    • NameID

    • Audience

    • Destination or ACS URL

    • Signature validity

    • Attribute values

  • Review relevant events in OneLogin under Activity → Events.

Common errors and resolutions

Typical Message

“You do not have access to this application.”

Possible causes

  • User not assigned to the OneLogin application

  • Email mismatch

  • Domain not verified

  • User belongs to another organization

Resolution

  • Assign the user or group to the application in OneLogin.

  • Verify NameID or email mapping.

  • Confirm domain verification.

  • Ensure the user exists in the correct organization.

❌ Invalid ACS URL

Typical message

  • “Invalid ACS URL”

  • “Destination mismatch”

Possible causes

  • Incorrect Assertion Consumer Service URL

  • Wrong environment (staging vs production)

  • Incorrect Entity ID

  • RelayState misconfiguration

Resolution

  • Copy the ACS URL directly from OpenText Core SCA’s metadata file.

  • Verify Entity ID matches exactly.

  • Remove trailing spaces or slashes.

  • Save configuration and retry login.

📩 Still facing issues?

When contacting support, include:

  • Screenshot of the full error

  • Timestamp of the failed login

  • User email address

  • OneLogin event logs (Activity → Events)

  • Captured SAML response (if available)

Providing complete diagnostic details will significantly speed up resolution.

Last updated

Was this helpful?