Using OneLogin for SSO with Showpad Updated March 11, 2025 16:07 Note: This article is no longer maintained. For updated information, please refer to the corresponding Admin App article. We recommend updating your links if you’ve linked to this article. Showpad offers a SAML-based Single Sign-On (SSO) service that allows users to use their organization's credentials to access Showpad. It simplifies your users' lives with fewer usernames and passwords, as there's only one account to remember. This article describes how you can set up SSO for Showpad using OneLogin as the Identity Provider (IDP). OneLogin users are mapped to Showpad users by email address. Key features Users can access Showpad with their OneLogin account Auto-provision & assign users to the right groups in Showpad Reduce security threats to sensitive data loss Centralized user, password, and authorization management You need this to succeed Platform Enterprise on Showpad(also available as an add-on on Showpad Plus pricing plan) Administrator access on both Showpad's Online Platform and OneLogin Basic OneLogin knowledge Unique users in OneLogin The quick way to awesomeness Create a new SAML custom connector app in OneLogin Download the OneLogin SAML metadata Enable SSO on Showpad's Online Platform Paste the XML metadata from OneLogin in the Showpad SSO configuration Choose SHA-256 as the Hash Algorithm Copy the Showpad Entity ID, Assertion Consumer Service Endpoint, and Single Logout Service Endpoint Configure the new OneLogin app with the Showpad data Log in with your OneLogin account Do this step by step Navigate to the Applications tab in your OneLogin administrator panel. Click Add App and search for SAML Custom Connector (Advanced). Choose a suitable display name for the setup (e.g: Showpad SAML) and click Save. Open the More Actions dropdown menu and download the SAML Metadata. Go to the Sign-on section in the Admin Settings of your Showpad organization. Click Add Configuration and provide an appropriate name (e.g: OneLogin SSO) along with the SAML 2.0 protocol. Paste the contents of the downloaded metadata XML in the Metadata XML field and choose SHA-256 as the Hash Algorithm. If preferred, you can enable auto-provisioning by ticking the checkbox. Click the info button of your newly added configuration in the Single Sign-on overview. Copy the Showpad Entity ID, Assertion Consumer Service Endpoint, and Single Logout Service Endpoint. Open the application you've created earlier in the OneLogin administrator panel. Select the Configuration tab, apply the following values and click Save: Audience (EntityID): <paste Showpad Entity ID> Recipient: https://<your-organization>.showpad.biz/sso/asc ACS (Consumer) URL Validator: ^https:\/\/<your-organization>.showpad.biz\/sso\/asc?service-id=<your-service-id>$ (Modified Assertion Consumer Service Endpoint) ACS (Consumer) URL: <paste Assertion Consumer Service Endpoint> Single Logout URL: <paste Single Logout Service Endpoint> Additionally, In case you want to enable auto-provisioning, the following actions are required. Open the Parameters tab. The field value pair NameID value -> Email should be present already. Add the following case-sensitive pairs and click Save: email: Email firstname: First Name lastname: Last Name Related articles Using PingOne for SSO with Showpad Set up SSO for Showpad with OneLogin General approach for SSO and Showpad Using Google for authentication with Showpad Guide to using SSO and Showpad