Single Sign-On (SSO)
Enable secure, centralized authentication for your team using your existing identity provider.
Supported Identity Providers
Okta
SAML 2.0 / OIDC
Azure AD
SAML 2.0 / OIDC
Google Workspace
SAML 2.0 / OIDC
OneLogin
SAML 2.0
Auth0
SAML 2.0 / OIDC
Custom SAML
SAML 2.0
SAML 2.0 Configuration
Step 1: Get Chatmefy SAML Details
Use these values when configuring Chatmefy in your identity provider:
https://app.chatmefy.com/saml/metadatahttps://app.chatmefy.com/saml/acshttps://app.chatmefy.com/saml/slourn:oasis:names:tc:SAML:1.1:nameid-format:emailAddressStep 2: Configure in Chatmefy
- 1.Go to Settings → Security → Single Sign-On
- 2.Select 'SAML 2.0' as the protocol
- 3.Enter your IdP's metadata URL or upload the metadata XML
- 4.Map user attributes (email, first_name, last_name)
- 5.Enable SSO and test with a user account
OpenID Connect Configuration
Required Configuration
openid profile emailAttribute Mapping
Map identity provider attributes to Chatmefy user fields:
| Chatmefy Field | Common SAML Attribute | OIDC Claim |
|---|---|---|
| email (required) | NameID or email | |
| first_name | givenName | given_name |
| last_name | surname | family_name |
| department | department | custom:department |
| role | groups | groups |
User Provisioning
Just-in-Time (JIT) Provisioning
Users are automatically created on first SSO login.
SCIM Provisioning
Sync users automatically from your identity provider.
Security Settings
Troubleshooting
"Invalid SAML Response" error
Ensure clock sync between IdP and Chatmefy. Check certificate expiration.
User attributes not mapping
Verify attribute names in IdP match Chatmefy expected names exactly.
"User not found" after SSO
Enable JIT provisioning or create user manually before first login.
Redirect loop during login
Check ACS URL configuration and clear browser cookies.