Page tree
Skip to end of metadata
Go to start of metadata

🔐 Single Sign-On (SSO) with SAML for OnePACS

OnePACS now supports Single Sign-On (SSO) via SAML 2.0, enabling seamless and secure authentication through your organization's identity provider (IdP), such as Okta, Azure Active Directory, or other SAML-compatible services.

✅ Benefits of Using SSO

  • Use Your Existing Credentials: Log into OnePACS with your corporate username and password.

  • Enhanced Security: Centralized authentication via your IdP supports stronger access controls, including MFA policies.

  • Improved User Experience: No need to manage a separate OnePACS password, fewer credentials to remember and reset.

🧩 Supported Identity Providers

OnePACS SAML SSO is compatible with major IdPs, including:

  • Okta

  • Microsoft Azure AD

  • Google Workspace (SAML)

  • Ping Identity

  • Auth0

  • JumpCloud
  • Any SAML 2.0-compliant IdP

Important Note: The OnePACS SAML Integration does not currently support user provisioning; however, this feature is planned for a future release. 

✅ Preconditions for SAML SSO Integration

Before configuring SAML in OnePACS, you will need to configure the application in your SSO Provider based on the following information.

OnePACS’ SAML ACS URL: Each Identity Provider now has a unique ACS URL, generated when you create the IdP record in OnePACS. This ACS URL must be used for:

  • Single Sign-On URL
  • Recipient URL
  • Destination URL
  • Audience URL

 Entity ID: The Entity ID for OnePACS is the same as the ACS URL for that IdP. 

📝 OnePACS Setup Requirements

To configure SSO for your organization:

Log in to OnePACS using your OnePACS admin credentials.

Identity Provider Configuration

Go to Admin > Identity Providers

Click Add at the bottom left of the screen.

Configure your Identity Provider in OnePACS with the metadata or information provided by your IdP:

  • Friendly Name for OnePACS

  • IdP Managers (Add facility managers by clicking in the IdP managers box, or click the magnifying glass to select multiple facility managers)
  • SSO URL from your IdP
  • Entity ID from your IdP
  • ACS URL (ACS URL only appears after first saving) 
  • Certificate

Important Note: The ACS URL is only generated after you save your Identity Provider. If you need the ACS URL before entering the final details, you can save the Identity Provider with blank or temporary values and update it later.

Assigning Users to IdPs

Go to Admin > Users

Add or edit an existing user. Expand Identity Providers at the bottom left of the screen. Select the Identity Provider previously configured, along with the IdP username (must match the NameID returned in the SAML response).

  **The IdP username must match the value passed back from this username attribute.

Important Note: Admins are responsible for creating Identity Providers (IdPs). They can either add users directly or delegate access by assigning privileges to facility managers, who can then add other facility managers, facility users, or assign existing users to IdPs for authentication.

Please reach out to our support team if you need assistance with setup.

🛠️ How It Works

Once SSO is configured for your account:

  1. Navigate to your OnePACS landing page (e.g., web.onepacs.com, my.onepacs.com).
  2. Use your organization’s unique sign-in URL for direct login through your IdP (optional). The URL will be your sub-domian.onepacs.com/saml2/authenticate/<number> (the number comes from the end of your ACS URL once it's generated).
  3. Authenticate using your corporate credentials.
  4. Upon successful login, you are automatically redirected back to OnePACS.
  • No labels