SSO setup
Setting up SAML login
Set SAML_DATABASE_URL to a postgres database. Please use a different database than the main Cal instance since the migrations are separate for this database. For example
postgresql://postgres:@localhost:5450/cal-saml
Set SAML_ADMINS to a comma separated list of admin emails from where the SAML metadata can be uploaded and configured.
Create a SAML application with your Identity Provider (IdP) using the instructions here - SAML Setup
Remember to configure access to the IdP SAML app for all your users (who need access to Cal).
You will need the XML metadata from your IdP later, so keep it accessible.
Log in to one of the admin accounts configured in SAML_ADMINS and then navigate to Settings -> Security.
You should see a SAML configuration section, copy and paste the XML metadata from step 5 and click on Save.
Your provisioned users can now log into Cal using SAML.
SAML Registration with Identity Providers
This guide explains the settings you need to use to configure SAML with your Identity Provider. Once this is set up you should get an XML metadata file that should then be uploaded on your Cal.com self-hosted instance.
Note: Please do not add a trailing slash at the end of the URLs. Create them exactly as shown below.
Assertion consumer service URL / Single Sign-On URL / Destination URL: http://localhost:3000/api/auth/saml/callback [Replace this with the URL for your self-hosted Cal instance]
Entity ID / Identifier / Audience URI / Audience Restriction: https://saml.cal.com
Response: Signed
Assertion Signature: Signed
Signature Algorithm: RSA-SHA256
Assertion Encryption: Unencrypted
Mapping Attributes / Attribute Statements:
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier -> id
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress -> email
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname -> firstName
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname -> lastName
Last updated