Available on plans:
Free
Pro
Team
Enterprise
Single sign-on (SSO) is a secure way to give your team access to Zapier. It creates a single set of credentials to access multiple applications, like Zapier. SSO with Security Assertion Markup Language (SAML) uses industry-standard SAML 2.0 so you can easily integrate with any identity provider (IdP) that supports this protocol.
Zapier has partnered with several IdPs to offer third-party connectors. Zapier supports both Zapier-initiated SAML SSO and IdP-initiated SAML SSO. You can also provision users using Just-in-Time provisioning (JIT).
You can use Single Logout (SLO) when configuring SAML SSO. When enabled, if you log out of your IdP, the provider will log you out of Zapier and vice versa. Support for SLO depends on your IdP.
Pre-requirements
To set up single sign-on, you must:
Manually configure SSO with SAML
1. Set up a custom SAML configuration
To set up a custom SAML configuration:
- Set up your IdP.
- Sign in to Zapier using your account owner's credentials.
- Go to the single sign-on settings page.
- In the SAML Identity Provider tab, enter the values provided by your IdP in the Entity ID, SSO URL, and Certificate fields.
- The entity ID is usually the IdP issuer.
- The SSO URL is the IdP's SSO URL.
- The certificate is the X.509 certificate offered by your IdP.
- [Optional] To enable SLO, click to toggle the Signed Single Logout switch to enable it.
- Enter the corresponding values from your IdP in the Email, First Name, and Last Name fields.
- Your IdP must format the NameID used in the Email field as
urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
. - If your IdP doesn't format the NameID this way, you must send an additional value to use in the Email field from your IdP’s configuration page.
- You can send first and last name along SAML assertions. Enter the names of those values in the associated fields.
- Your IdP must format the NameID used in the Email field as
2. Test your SAML configuration
Before enabling SSO for your entire organization:
- Click Test Configuration.
- If the connection is working, a new browser tab or window for your IdP will open. There, your IdP will:
- Authenticate your account.
- Redirect you to a page containing the SAML response received from the IdP.
3. Enable SAML single sign-on
Once you've tested your configuration and ensured SSO is working:
- Return to the SAML Identity Provider section.
- Click the Enable SAML login switch.
- This will force all team members to log in with SAML SSO.
- This will disable the use of username and password.
- Click Save changes to finalize changes.
4. Copy your single logout certificate
You will need to enter this value in your IdP.
- Go to the Service Provider tab.
- In the Single Logout Certificate field, click the copy icon. This will copy the value to your clipboard.
- Then paste the value into the appropriate field in your IdP.
5. Notify your team
Zapier can automatically send instructions on how to log in via SAML SSO to your team.
- Go to the Notify Team Members tab.
- Click Send Email. This will send an email to your team members.
Additional technical information
- Zapier uses SAML 2.0 with HTTP Redirect Binding for service provider to IdP (Zapier to IdP). It requires HTTP POST binding for IdP to service provider.
- The Consumer URL is the post-back URL, also known as the Assertion Consumer Service URL. The post-back URL is namespaced by a tenant identifier that is unique to your organization. You can also use the Tenant Identifier field for configuring third-party connections from IdP app catalogs.
- The NameID must contain the user's email address. You must format the Name ID as
urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
. - Zapier supports both signed and unsigned SLO. For signed SLO, you must send the SLO URL to your IdP after configuring an IdP in Zapier. The SLO URL is found in the Service Provider tab.
- Your IdP must send the following values with SAML assertions:
- For first name, Zapier looks for
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname
orurn:oid:2.5.4.42
by default. - For last name, Zapier looks for
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname
orurn:oid:2.5.4.4
by default. - For email, Zapier looks for
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
if the NameID is not in the email format. - If Zapier doesn't receive these values, you must configure your IdP to send them. You can use the optional configuration mapping to map custom attributes.
- For first name, Zapier looks for
Use custom SAML connectors
OneLogin
If using OneLogin, Zapier recommends using the published Zapier SAML app for OneLogin. If you need to configure a custom app:
- In OneLogin, go to Company Apps and add a SAML connector.
- Go to the SSO tab.
- Copy the Issuer URL value and paste it into Zapier's Entity ID field.
- Copy the SAML 2.0 Endpoint value and paste it into Zapier's SSO URL field.
- [Optional] To enable SLO, copy the SLO endpoint value and paste it into Zapier's SLO URL field.
- Copy the X.509 certificate value and paste it into Zapier's Certificate field.
- In Zapier, you must not enable the Zapier's SAML connector yet. The Enable SAML login switch must remain disabled.
- Save the SAML connector by clicking Save Changes. In OneLogin you will see Zapier's specific configuration appear.
- In Zapier, copy the Audience value and paste it into OneLogin.
- In Zapier, copy the Consumer URL value and paste it into OneLogin's Recipient and ACS (Consumer) URL fields.
- [Optional] To enable SLO, copy Zapier's Single Logout URL value and paste it into the corresponding field in OneLogin.
- Save your OneLogin configuration.
- Assign test users to test your configuration before enabling it for all users.
- Test the SAML integration by clicking Test Configuration in Zapier.
- Once testing is complete, click Enable SAML login to enable your configuration.
If first name and last name fields are shown, you must enter:
-
firstname
in the First Name field, -
lastname
in the Last Name field.
Okta
If using Okta, Zapier recommends using the published Zapier SAML app for Okta. Follow these instructions to configure a custom app.
Then, configure your single logout certificate.
- Go to the Service Provider tab.
- In the Single Logout Certificate field, click the copy icon . This will copy the value to your clipboard.
- Open a text editor and paste the certificate value.
- Save the file as
slo.cert
.
Then, in Okta:
- Under Applications, select the Zapier SAML app.
- Select the Sign On tab.
- Click Edit.
- In the Signature Certificate field under the Enable Single Logout checkbox, click Browse.
- Search for and select the
slo.cert
file. - Click Upload to upload it to Okta.
- Click Save.

- Okta only supports signed SLO and service provider-initiated SLO.
- You must copy your single logout certificate in Zapier. Do not use the certificate linked in Okta’s instructions.
Google Workspace
- In your Google admin console, create a custom SAML application.
- Copy the SSO URL, Entity ID, and Certificate values.
- Go to the SAML Identity Provider tab on the single sign-on page in Zapier and paste the Google values into the corresponding fields in Zapier.
- In Google, copy the SSO URL, Entity ID, and Certificate values and paste them into the corresponding fields in Zapier.
- In Google, click Continue.
- In Zapier, click the Service Provider tab.
- Copy the Consumer URL value and paste it into Google’s ACS URL field.
- Copy the Audience value and paste it into Google’s Entity ID field.
- Copy the SP SSO URL value and paste it into Google’s Start URL field.
- In Google, select Email from the Name ID format dropdown menu.
- In Google, select Basic Information > Primary Email from the Name ID dropdown menu.
- Click Continue.
- [Optional] Add attributes in Google.
- Return to the SAML Identity Provider tab in Zapier.
- Copy and paste the URLs from the corresponding fields in Zapier to the corresponding attributes in Google.
- In Google, click Continue.
- Select the custom SAML app that you created.
- In the User Access section, click View Details.
- Click On for everyone to enable your custom SAML app.
- Test the SAML integration by clicking Test Configuration in Zapier.
- Once testing is complete, click Enable SAML login to enable your configuration.
Microsoft Entra
- In the Entra portal, select Enterprise Applications, then click New application.
- Click Non-gallery application.
- In the Manage menu, click Single sign-on.
- Click SAML, then click the pencil icon to edit the basic SAML configuration.
- Using the information provided in the Service Provider tab in Zapier, enter the following fields:
- In the Identifier (Entity ID) field, paste the Audience URL value from Zapier.
- In the Reply URL (Assertion Consumer Service URL) field, paste the Consumer URL value from Zapier.
- In the Sign on URL field, paste the SP SSO URL value from Zapier.
- In the Logout URL field, paste the Single Logout Url value from Zapier.
- In the SAML Signing Certificate section in Entra, click Download to download the Certificate (Base64).
- In the SAML Identity Provider tab in Zapier:
- In the Certificate field, paste the file contents from Entra.
- In the SSO URL field, paste the Login URL from Entra.
- In the Entity ID field, paste the Entra Identifier from Entra.
- [Optional] In the IdP Single Logout Url field, paste the Logout URL from Entra.
- Add an Entra test user, then test the Zapier application in Entra.
- Test the SAML integration by clicking Test Configuration in Zapier.
- Once testing is complete, click Enable SAML login to enable your configuration.
App catalog connectors
Zapier recommends using the published Zapier SAML app for OneLogin or the published Zapier SAML app for Okta. You can use other IdPs if they support SAML 2.0. To configure SAML with other IdPs, use your tenant identifier (a unique ID specific to your configuration).
Send an email notification to members
After you enable SAML SSO, you can send an email notification to your members about the change. The email will prompt them to connect their accounts using SSO.
Configure a custom session timeout limit
If you want to change your session timeout limit, you can configure a custom session timeout limit in your IdP. Zapier will use that session timeout length if it's shorter than Zapier’s default session timeout length (7 days). If it's longer than 7 days, Zapier will use its own default instead.
Remove SAML single sign-on
If you need to remove SAML SSO:
- Click the Enable SAML login switch to disable it.
- Once it's disabled:
- Users who had a password set up before enabling SAML SSO will use it to log in.
- Users who joined after enabling SAML SSO must reset their password to log in.
Limitations
- You must verify at least one domain before you can enable SAML SSO or user provisioning.
- Zapier supports the following SLO:
- IdP-initiated SLO.
- Zapier-initiated SLO.
- Signed and unsigned SLO.
- Team trials do not have access to SSO.
- If SSO is not available on your Team plan, you might be on a legacy plan. You must move to a current plan to have access to this feature.
After you enable SAML:
- You cannot enable 2FA in your Zapier account. You must configure your IdP to use 2FA instead.
- You must use SAML SSO to log in. Once you enable SAML SSO, your username and password and Google SSO will no longer work.
- Members from other domains will be locked out if those domains are not configured in the IdP. Zapier’s SAML system checks if:
- The account you’re trying to access requires SAML authentication.
- The account owns the domain used in your email address.
Common errors
“The response was received at ‘'instead of'”
There is a disconnect between what the IdP expects for the recipient value and what Zapier is sending. In most cases, the recipient is the Assertion Consumer URL. Additional slashes may also cause this error.
“Is not a valid audience for this response”
The audience value from Zapier must match the one from your IdP.
“SAML login failed: the email needs to be provided”
The NameID format is incorrect or your IdP didn’t send an email value. If your IdP sends an email value with SAML assertions, you must save that mapping in Zapier.
“Found different email address than the one that started the flow”
Your SAML SSO configuration in Zapier is using a different email address than the one sent by your IdP. Ensure you're using the correct username, check your IdP and Zapier settings, then log out and log in again.
If you need additional help setting up SSO with SAML, contact Premier Support.