This site requires JavaScript to be enabled
External Customer KB > General > Configuring SAML for Monday
Configuring SAML for Monday
Article: KB0010034 Published: 02/23/2023 Last modified: 11/09/2023

This topic describes how to configure OneLogin to provide SSO for Monday using SAML. (If you want to set up SSO using form-based authentication, see Configuring SSO for a Form-Based Application.)

  1. Log in to OneLogin and go to Apps > Add Apps.

  2. Search for Monday and select it.

    Apps that are enabled for SAML are identified with the label SAML2.0.

  3. When the Configuration tab appears, update the app display name or icons if you like, and click Save to add the app to your Company Apps.

    Additional tabs appear, and you land on the Info tab.

  4. Go to the Configuration tab and enter your Monday Subdomain in the Application Details section.

  5. Click Save.

  6. On the Parameters tab, confirm your credential settings and user attribute mappings.

     

    In most cases, you can keep the Configured by admin default credential option. For more information, see Setting Credential Configuration Options.

    In most cases, you can also accept the default attribute mappings.

    NameID (Subject) is included in the SAML assertion passed by OneLogin to Monday. You should keep the default OneLogin value of Email.

    The SCIM Username is used for provisioning. See Provisioning for Monday.

  7. Go to the SSO tab to copy the SAML metadata that you must provide to Monday to complete the integration.

     

    Copy the following values:


    • SAML Issuer URL: the OneLogin URL that provides data about OneLogin as a SAML-providing IdP.

    • SAML 2.0 Endpoint (HTTP): the OneLogin URL that the app redirects to for SSO if a session isn't already established.

    • X.509 Certificate: the Public certificate that establishes trust between OneLogin and the app provider.

      To copy the X.509 certificate, click View Details and click the Copy to Clipboard icon for the X.509 Certificate. If you want a different certificate, click Change on the SSO tab, select the new certificate, and follow the above instructions. You must include the entire certificate, including -----BEGIN CERTIFICATE----- and -----END CERTIFICATE------ when you provide it to the app provider.

      See also Creating and Applying Certificates.

       

  8. In OneLogin, go to the Access tab to assign the OneLogin roles that should have access to Monday and provide any app security policy that you want to apply to Monday.

    monday4.png

    You can also go to Users > All Users to add the app to individual user accounts, and return to this app configuration page to complete SSO configuration.

  9. Click Save.

 

Enable SAML within Monday

  1. Sign into Monday.com and go to the Admin section, then select Security from the left hand menu and click Open to the right of Single Sign-On (SSO).

  1. Choose OneLogin as the SAML provider and enter the copied information from step 7 above.
OneLogin Value Monday Value
Issuer URL SAML SSO Url
SAML 2.0 Endpoint Identity provider issuer
X.509 Certificate Public certificate

 

Test the SAML Connection

Ensure that you have matching user accounts in the app and OneLogin (the OneLogin email address or username is identical to the app user name).

You can create a test user, or you can use your own account if you choose.

  1. Make sure you are logged out of the app.

  2. Log in to OneLogin as an admin and give the test user access to the app in OneLogin. (See step 8 above)

  3. Log in to OneLogin as the test user.

  4. Click the app icon on the OneLogin dashboard. If you are able to access the app, then SAML works.


Expand/Collapse Comments
:     
Was this helpful?
YesYesNoNo