Ideagen EHS Core and Ideagen Hub - SSO (SAML) Setup Guide
Who is this article for?
IT administrators and tenant administrators configuring SSO (SAML) for Ideagen Hub.
Covers: Okta · Microsoft Entra · PingID · Google Workspace
Pre-requisites – obtaining your Hub SAML values
Before configuring your identity provider, complete the following steps inside Ideagen Hub to obtain the values required for your SSO setup.
Step 1 – Access the Admin Console
Log in to Hub. Click your profile avatar in the top-right corner and select Admin Console.
Step 2 – Open External IDP Configuration
Inside the Admin Console:
- Click the Security Centre icon in the left sidebar.
- Expand the Authentication section.
- Click Configure > next to External IDP Configuration.
Step 3 – Add an Identity Provider
Click + Add identity provider.
Step 4 – Select SAML
When prompted to choose an IDP configuration type, select SAML and click Next.
Step 5 – Note your Hub SAML values
Hub will display the Identifier (Entity ID) and Reply URL (Assertion Consumer Service URL) specific to your organisation. Keep this screen open — you will need to copy these values into your identity provider's configuration.
You may also download the signing certificate and encryption certificate from this screen if required by your IdP.
Okta
Step 1 – Set up the new SAML application
- Log in to your Okta Admin Console and navigate to Applications > Applications > Create App Integration > SAML 2.0.
- Enter the App Name as Ideagen Hub and add a logo if required.
- Click Next.
- Navigate to the Configure SAML tab of the application.
- Enter the following values from Hub into the corresponding Okta fields:
| Okta field | Hub value to enter | Fixed value |
|---|---|---|
| Audience URI (SP Entity ID) | Identifier (Entity ID) | |
| Single sign-on URL | Reply URL | |
| Name ID format | EmailAddress | |
| Application Username |
Click Next to generate the new app.
Step 2 – Attribute mapping
- Once the new app has been generated, select the Sign On tab and scroll to Attribute Statements.
- Next to Profile attribute statements, click Edit to create two new attributes:
| Name | Name format | Value |
|---|---|---|
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress |
Unspecified | user.email |
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn |
Unspecified | user.login |
Step 3 – Get Okta's Metadata URL (new setup only)
- After saving the SAML configuration, navigate to the application's Sign On tab.
- Under Metadata details, locate the Metadata URL and click Copy.
Step 4 – Back in Hub (new setup only)
- Return to the Hub SAML Configuration screen.
- Under Metadata document source, select Enter metadata document endpoint URL and paste Okta's Metadata URL into the field.
- Under Map attributes, add the following mapping and click Apply Configuration:
| User pool attribute | SAML attribute |
|---|---|
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress |
|
| preferred_username | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn |
Microsoft Entra (Azure AD)
Step 1 – In Microsoft Entra
- Log in to the Microsoft Entra admin centre and create a new Enterprise Application with SAML-based sign-on, or open an existing one.
- Navigate to Single sign-on and select SAML.
- In the Basic SAML Configuration section, enter the following values from Hub:
| Hub value | Entra field |
|---|---|
| Identifier (Entity ID) | Identifier (Entity ID) |
| Reply URL (Assertion Consumer Service URL) | Reply URL (Assertion Consumer Service URL) |
Step 2 – User attributes & Claims
Add two new claims within this section:
| Name | Value |
|---|---|
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress |
user.mail |
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn |
user.userprincipalname |
Step 3 – Download Federation Metadata XML (new setup only)
- Scroll to the SAML Certificates section.
- Click Download next to Federation Metadata XML and save the file.
Step 4 – Back in Hub (new setup only)
- Return to the Hub SAML Configuration screen.
- Under Metadata document source, select Upload metadata document and upload the XML file downloaded in Step 3.
- Under Map attributes, add the following mapping and click Apply Configuration:
| User pool attribute | SAML attribute |
|---|---|
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress |
|
| preferred_username | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn |
PingID
Step 1 – In PingID
- Log in to your PingID Admin Console and create a new application.
- From the SAML Configuration tab, select Manually Enter and enter the following values:
| Hub value | PingID field |
|---|---|
| Identifier (Entity ID) | Entity ID |
| Reply URL | ACS URL |
- From the Attribute Mappings tab, select the pencil icon in the top right-hand corner.
- Select + Add and enter two new mappings:
| Attributes | PingOne Mappings | Required |
|---|---|---|
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress |
Email Address | ✓ |
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn |
Email Address | ✓ |
Step 2 – Download SAML Metadata XML (new setup only)
Within PingID, navigate to the Configuration tab of the application and click Download Metadata.
Step 3 – Back in Hub (new setup only)
- Return to the Hub SAML Configuration screen.
- Under Metadata document source, select Upload metadata document and upload the XML file downloaded in Step 2.
- Under Map attributes, add the following mapping and click Apply Configuration:
| User pool attribute | SAML attribute |
|---|---|
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress |
|
| preferred_username | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn |
Google Workspace
Step 1 – In Google Workspace Admin Console
- Log in to the Google Workspace Admin Console and navigate to Apps > Web and mobile apps.
- Add a new custom SAML application.
- In the Service provider details step, enter the following values from Hub:
| Hub value | Google field |
|---|---|
| Identifier (Entity ID) | Entity ID |
| Reply URL | ACS URL |
- Under SAML attribute mapping, enter the following:
| Google Directory attributes | App attributes |
|---|---|
| Basic information > Primary email | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress |
| Basic information > Primary email | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn |
Step 2 – In Hub – Enter Provider Name (new setup only)
- Return to the Hub SAML Configuration screen.
- Enter a Provider name for this identity provider.
Step 3 – Download Google Metadata XML (new setup only)
Back in the Google Workspace Admin Console, click Download Metadata to download the metadata XML file for this SAML app.
Step 4 – Back in Hub (new setup only)
- Under Metadata document source, select Upload metadata document and upload the XML file downloaded in Step 3.
- Under Map attributes, add the following mapping and click Apply Configuration:
| User pool attribute | SAML attribute |
|---|---|
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress |
|
| preferred_username | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn |
Key resources
- FAQs: Ideagen Hub and Ideagen EHS Core
- Get Ready for Your New Command Centre for Ideagen EHS Core (SSO login)
- Notifying your team about the Ideagen Hub and EHS Core migration (SSO login)
- Getting Started: One hub, endless possibilities
- Ideagen Hub user guide
- Ideagen Hub administration guide
- Ideagen Hub release notes