Setup and Configure SSO
Learn how to set up and configure SAML SSO in Security Journey, including required IdP settings, metadata options, and supported features.
Setup and Configure SSO
Security Journey supports SAML 2.0 Single Sign-On (SSO) and allows organizations to configure SSO through a self-service setup process. This article outlines what you need, what’s supported, and the technical values required by your Identity Provider (IdP).
Prerequisites
To enable SSO in Security Journey, you need:
-
A SAML 2.0–compliant Identity Provider (IdP)
-
An Admin account in Security Journey (to access SSO settings)
What Security Journey Supports
Security Journey currently supports the following SSO features:
-
Just-in-Time (JIT) provisioning (creates new users automatically at login)
-
Service Provider (SP)–initiated login
-
SAML claims → Learner Attributes mapping (send profile data like first name, last name, title, department, etc.)
How to Configure SSO
SSO setup is self-service in the Security Journey Admin interface.
In your Security Journey SSO settings, you can provide your IdP configuration using either:
-
A metadata.xml file upload, or
-
Your IdP Metadata URL (if available)
SSO Technical Values (for your IdP)
Use the following values when configuring your IdP:
-
Entity ID
urn:amazon:cognito:sp:us-east-1_CHi5tsM8X -
Assertion Consumer Service (ACS) URL
https://auth.hackedu.com/saml2/idpresponse -
Sign-on URL
https://my.securityjourney.com/login/?domain=companydomain.com
IdP-Specific Setup Guides
Security Journey provides provider-specific setup documentation for many IdPs.
To find the correct guide:
-
Go to the Help Center search.
-
Search for your IdP name (example: “Okta”, “Ping Identity”, “Keycloak”).