Custom SAML 2.0 Connection

Use this guide when your Identity Provider is not Okta, OneLogin, or Azure and supports standard SAML 2.0.

Purpose

Connect any standards-compliant SAML 2.0 IdP to Revspire for centralized sign-in.

Before you start

  • IdP admin access.
  • In Revspire Setup > SSO, copy ACS URL, SP Entity ID, SP Login URL, and SP Logout URL.
  • Confirm your IdP can export Issuer, SSO URL, and signing certificate.

Steps

Step 1: Configure SAML app in your IdP

  1. Create a new SAML 2.0 app for Revspire.
  2. Set ACS URL to Revspire ACS URL.
  3. Set Audience/Entity ID to Revspire SP Entity ID.
  4. Map NameID/identifier claim to a value that matches Revspire username or email.
  5. Assign users/groups for access.

Step 2: Collect IdP values

  • Issuer Entity ID
  • SSO URL (IdP Login URL, HTTPS)
  • X.509 signing certificate (PEM)

Step 3: Add custom provider in Revspire

  1. Go to Setup > SSO.
  2. Click Add and choose Custom SAML 2.0.
  3. Enter Issuer Entity ID, SSO URL, and X.509 certificate.
  4. (Optional) set as primary provider.
  5. Save and run a login test.

Troubleshooting

  • SSO URL must be HTTPS.
  • Issuer must be unique inside your organization setup.
  • User must exist as active in Revspire before SSO login succeeds.
  • If NameID is not recognized, align claim mapping with Revspire username/email.