What can we help you with?

Custom SAML 2.0

If you haven't read our first article about SAML, we recommend you to check out this article right here prior reading this one. 

We are currently working with two main SAML providers: OKTA and OneLogin but we also offer you the option to custom SAML 2.0 with the provider of your choice. Here is how!

Note:  The metadata file is only accessible to monday.com account admins.

 

Step 1: Get the data

You have two options to get the data in order to set up your custom SAML SSO.

  • SP (monday.com) metadata:

You can get the metadata of monday.com from this URL: 

https://<YOUR_DOMAIN>.monday.com/saml/saml_metadata
  • Assertion Consumer Service URL

SSO post-back up URL - https://<YOUR_DOMAIN>.monday.com/saml/saml_callback (Also known as the Assertion Consumer Service URL)

Entity ID - https://<YOUR_DOMAIN>.monday.com/saml/saml_callback 

Step 2: Attributes to be included in IDP response

  • NameID (Required)

 

<saml:Subject>
<saml:NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:persistent"
NameQualifier="YOURDOMAIN.monday.com" SPNameQualifier="https://monday.com">Your
Unique Identifier</saml:NameID>
</saml:Subject>
<saml:Subject>
<saml:NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:emailAddress"
NameQualifier="YOURDOMAIN.monday.com" SPNameQualifier="https://monday.com">Your
Unique Identifier</saml:NameID>
</saml:Subject>

 

  • Email Attribute (Required)
<saml:Attribute Name="Email"
NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
<saml:AttributeValue xsi:type="xs:anyType">[email protected]
</saml:AttributeValue>
</saml:Attribute>

 

  • First Name Attribute (Required)
<saml:Attribute Name="FirstName"
NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
<saml:AttributeValue xsi:type="xs:anyType">FirstName
</saml:AttributeValue>
</saml:Attribute>
  • Last Name Attribute (Required)
<saml:Attribute Name="LastName"
NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
<saml:AttributeValue xsi:type="xs:anyType">LastName
</saml:AttributeValue>
</saml:Attribute>

 

Step 3: Certificates

monday.com requires that the SAML response is signed, and you will need to paste a valid X.509.pem Certificate to verify your identity. This is different from your SSL certificate.  

Encryption Certificate: When configuring your SAML settings, you will see a check box to "Enable Monday Certificate". If your organization is hoping to send encrypted SAML responses, select "Enable Monday Certificate". This will provide you the public encryption certificate to input into the IdP that ensures monday.com will be able to decrypt the SAML response.  

 

 

If you have any further questions about setting up SSO with monday.com, feel free to reach out to our customer success team anytime right here