When using SAML SSO with Sevalla, login must always be initiated from Sevalla. Logging in directly from your Identity Provider (IdP) is not supported.IdPs only support one active session per browser. If you have multiple Google Workspace accounts and are logged into one, attempting to log into another through Sevalla will result in an error. To switch accounts, log out of Google Workspace or use your browser’s Incognito/Private mode.
Enable SSO in Sevalla
When you set up SAML SSO, you can navigate away from the SSO setup at any stage to store your progress and return later. In Sevalla, go to your Settings > Single sign-on, and click Enable.
Enable SSO in Sevalla.

Introduction to the steps required to set up SSO.
Set up the app integration in Ping Identity
In Sevalla, the Create SAML app tab provides all the information you need to set up your SAML app within Ping Identity. The following steps explain where to add this information.
Information to create the SAML app at your IdP.

Create an environment within Ping Identity.

Manage your environment in Ping Identity.

Add an application in Ping Identity.

Application details in Ping Identity.
- ACS URLs: Copy and paste the SSO/ACS URL from Sevalla.
- Entity ID: Copy and paste the Entity ID from Sevalla.

SAML Configuration in Ping Identity.
Map your Ping Identity attributes
Click Attribute Mappings and then click the edit icon.
Edit the attribute mappings in Ping Identity.
| Attributes | PingOne Mappings | Required |
|---|---|---|
| firstName | Given Name | Selected |
| lastName | Family Name | Selected |
| Email Address | Selected |

Map the required attributes in Ping Identity.
Assign user access in Ping Identity
By default, the new application will allow all users to access it. To define specific user groups for access to this, in Ping Identity, navigate to Applications, select the application you set up for the Sevalla Dashboard, click Access, and then click the edit icon. You can choose whether you want only admin users to access the application or select which groups should have access.
Assign user groups to the application in Ping Identity.
Sevalla setup
In Sevalla, on Create SAML app, click Continue so that you are on the Sevalla setup page.Email domain
In the Domain name, enter the email domain users will use to sign in using SAML SSO, and click Add domain. Only Sevalla accounts with an email address matching the verified domain can authenticate via SAML. For example, if SAML is enabled forexample.com, only users with an @example.com email address will be able to sign in for that company.
Each email address can only be linked to one SAML configuration in Sevalla. This means a domain (e.g.,
example.com) can be associated with only one company at a time. Similarly, each Sevalla user can use SAML authentication for a single company only.
Add the TXT record to your DNS to verify ownership.
Set up Sevalla SAML
In Ping Identity, go to Applications, select the application you set up for the Sevalla Dashboard, click Overview, and then scroll down to Connection Details. This page provides all the information you need to set up SAML in Sevalla.
Connection details in Ping Identity.
- SSO URL: Copy and paste the Initiate Single Sign-On URL from Ping Identity.
- Entity ID: Copy and paste the Issuer ID from Ping Identity.
- Public certificate: Within Ping Identity, click Download Signing Certificate, select X509 PEM (.crt). Open this file in any text editor, and copy and paste the contents into Sevalla.
Test the authentication in Sevalla
You cannot enable SAML SSO within Sevalla without first testing the authentication. In Sevalla, within Single sign-on, click Continue until you are on the Test and finish tab, and click Test authentication. A notification appears if the test was successful or if the test fails. If the test fails, click Back and check your SAML settings within your IdP and within Sevalla. If the test is successful and you want to enable SAML, click Save and set SSO live.
Test your SSO setup and set SSO live.

Sign in to Sevalla with SAML SSO.





