You are using an unsupported browser. Please update your browser to the latest version on or before July 31, 2020.
Using Custom SAML for Single Sign On (SSO)

HappyFox provides Secure Assertion Markup Language (SAML), which allows you to provide single sign-on (SSO) for your HappyFox account using identity providers such as Azure Active Directory, Onelogin, Okta, Smartsignin or a SAML compatible app that you host on your own. Single sign-on using SAML is available on Mighty plan and above. 

HappyFox allows you to use SAML to authenticate and log in to both agent and contacts. 

Steps to Configure a Custom SAML SSO:

  • Navigate to Apps >> Single Sign-on >> Custom SAML Method.
  • HappyFox needs the following information to be entered in our SAML Integration page
    • The URL to be redirected to when someone clicks on the Login with SAML button in HappyFox (SSO Target URL).
    • The SAML certificate from your SAML server. X.509 certificates are supported and should be in PEM format. 


  • Additionally, you can specify if you would want agents and/OR end-users to authenticate their login using SAML.
  • Enable the "Map Custom Field values from SAML option to synchronized contact custom fields with the identity provider. Learn more.
  • You can disable the traditional username/password login method by enabling the "Disable Standard login for agent/contact" toggle.

The SAML server might require the following information: 

  1. The Access Consumer Service (ACS) URL is https://<accountname> If you only need to authenticate agent members, you can use https://<accountname> 

  2. The NameID format should be urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress. This email address is used to match and/or create the agent or contact as necessary in HappyFox. With this attribute, the name and email ID of the user will be pulled in from the SAML identity provider into HappyFox. 


0 out of 1 found this helpful

scroll to top icon