This guide walks you through setting up OneLogin as a SAML Identity Provider (IdP) for CloudDefense.AI using an Auth0 Enterprise → SAML connection.
OneLogin Setup
Log in to OneLogin (admin).
Open your OneLogin admin portal so you can add an app.Go to Applications → Add App.
This is where you create the SSO app your users will use.Search “SAML Custom Connector (Advanced)” and add it.
This is a generic SAML app that lets OneLogin talk to CloudDefense.AI through Auth0.Fill in the SAML settings:
Audience (Entity ID):
urn:auth0:YOUR_TENANT:YOUR_CONNECTION_NAMETells OneLogin exactly which Auth0 connection it’s sending users to.
Recipient / ACS (Assertion Consumer Service) URL:
https://YOUR_DOMAIN.auth0.com/login/callbackWhere OneLogin should send the user after a successful sign-in.
Single Logout URL (optional):
https://YOUR_DOMAIN.auth0.com/logoutWhere to send users when they sign out, if you want single-logout.
User attributes: Map the basics so your app knows who signed in:
email→ user’s emailname→ full name (or use first/last name separately)groups(optional) → team/role info if you plan to use it
- Download the IdP metadata:
Save the metadata XML from the app’s SSO page. It contains the OneLogin SSO URL and certificate you’ll upload to Auth0 in the next step.
Auth0 Setup:
- Go to Auth0 Dashboard → Authentication → Enterprise → SAMLP.
- Create a new SAML connection.
- Upload the IdP metadata file you downloaded from OneLogin.
- Set the connection name (e.g., onelogin-saml).
- Enable the connection for the applications that should use OneLogin.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article