Use this guide when your Identity Provider is not Okta, OneLogin, or Azure and supports standard SAML 2.0.
Purpose
Connect any standards-compliant SAML 2.0 IdP to Revspire for centralized sign-in.
Before you start
- IdP admin access.
- In Revspire Setup > SSO, copy ACS URL, SP Entity ID, SP Login URL, and SP Logout URL.
- Confirm your IdP can export Issuer, SSO URL, and signing certificate.
Steps
Step 1: Configure SAML app in your IdP
- Create a new SAML 2.0 app for Revspire.
- Set ACS URL to Revspire ACS URL.
- Set Audience/Entity ID to Revspire SP Entity ID.
- Map NameID/identifier claim to a value that matches Revspire username or email.
- Assign users/groups for access.
Step 2: Collect IdP values
- Issuer Entity ID
- SSO URL (IdP Login URL, HTTPS)
- X.509 signing certificate (PEM)
Step 3: Add custom provider in Revspire
- Go to Setup > SSO.
- Click Add and choose Custom SAML 2.0.
- Enter Issuer Entity ID, SSO URL, and X.509 certificate.
- (Optional) set as primary provider.
- Save and run a login test.
Troubleshooting
- SSO URL must be HTTPS.
- Issuer must be unique inside your organization setup.
- User must exist as active in Revspire before SSO login succeeds.
- If NameID is not recognized, align claim mapping with Revspire username/email.