SAML / Single Sign-On
Overview
With Heeler, you can enable single sign-on (SSO) using an Identity Provider (IdP) that supports Security Assertion Markup Language (SAML), such as Okta, Microsoft Entra ID, Google, or Ping Identity.
Heeler uses SAML 2.0 for all SAML SSO configurations. This includes configurations with supported Identity Providers and any custom configurations.
Requirements
SAML 2.0 Identity Provider
Download the IDP metadata xml from your Identity Provider
Heeler (Service Provider) Setup
Navigate to SAML Setup from the Administration icon -> Settings

Upload the Metadata XML file retrieved from your Identity Provider to Heeler
Identity Provider Setup
Copy the Entity ID
, Assertion Consumer URL
, and ACS Binding
settings over to your IDP to configure Heeler as a Service Provider.
Heeler supports the HTTP-POST binding for SAML2:
urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST
Heeler specifies
urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
for the format of the NameIDPolicy in assertion requestsRequired that SAML Responses are Signed
Required Attributes:
First Name
Last Name
Email

Optional SAML Settings
SAML Strict (recommended): Requires the SAML standard is strictly followed by the IDP including signing and encryption
Just-in-Time Provisioning (recommended): Once granted access in the IDP, new users are automatically created in Heeler when they log in from the IDP.
Group Mapping: Automatically sync group membership of the IDP in Heeler.
Last updated
Was this helpful?