1. Help Center
  2. Integrations
  3. Security and sign-on integrations

OneLogin

Integrating Lucidpress with OneLogin enables your users to authenticate using SAML single sign-on.

Step 1: Configure settings in Lucidpress

1) Log in to Lucidpress. Remember: you will need to have admin permissions. Click “Team” on the left. Then, select “Identity Management”.

2) Check the box next to “Allow SAML authentication”. You can choose to unselect the other sign-on options if OneLogin is the only way your users will sign in to Lucidpress. Then, click “Save Changes”.

3) On the same page, click "Configure" to navigate to your SAML Activation page in Lucidpress.

4) Under "Lucidpress Sign in URL," enter your Domain name. For the most part, this can be named anything of your choice. The example below shows “test”. Click "Save Changes."

Step 2: Configure SAML for Lucidpress in OneLogin

To configure SAML or SCIM with OneLogin for your Lucidpress account, you must first add an application to your OneLogin instance. To do so, navigate to the OneLogin portal.

1) Click “Applications” on the top-left.
2) Click “Add App” on the top-right. Search for “SAML Test Connector (IdP w/ attr w/ sign response)”.
3) Name your app, add icons, and click “Save”.
4) After you click save, click “Configuration” on the left. Add https://www.lucidpress.com/saml/sso/[YOUR_DOMAIN] to every field (except for Single Logout URL). (Replace [YOUR_DOMAIN] with what you entered in Lucidpress from step 1)
5) Go to “SSO” on the left. Change the SAML Signature Algorithm to SHA-256.
6) Assign users to the app under the “Users” tab. Click “Save” when done.
7) After you save the app, on the top-right click “More Actions > SAML Metadata”. The XML metadata should download to your computer.

Step 3: Return to Lucidpress

1) Return to Lucidpress. If you are not already, go to the “Team” tab, then click “App Integration > SAML”.
2) Under “Identity Providers”, upload the metadata file you downloaded. 
3) If you assigned the OneLogin app to your username, you can click “Test SAML Connection”.