Key Features
- SP-initiated and IdP-initiated flows
- SHA-256 signature algorithm
- NameID format: emailAddress
- Per-email-domain provider routing (multi-IdP in one tenant)
- Auto-provisioning on first login (optional)
Requirements
- 1SAML 2.0-compliant IdP (Okta, Azure AD, Google Workspace, etc.)
- 2IdP metadata XML or IdP Entity ID + SSO URL + signing certificate
- 3Cremit Argus Enterprise plan
Setup Time15 min
Step-by-step setup guide
The exact flow you follow inside the dashboard.
Overview
SAML Single Sign-On lets your users authenticate to Argus through your existing identity provider. Supports SP-initiated and IdP-initiated flows, SHA-256 signing, and per-email-domain routing so multiple IdPs can coexist in one Argus tenant.
Prerequisites
- Argus Enterprise plan
- Admin access to your IdP (Okta, Azure AD, Google Workspace, OneLogin, Ping, JumpCloud, or any SAML 2.0 IdP)
- The IdP's metadata XML, or its Entity ID + SSO URL + signing certificate
Step-by-Step Setup
Step 1: Open Add SAML Provider in Argus
- Argus > Enterprise > SSO > Add SAML Provider
- Enter a unique Provider ID such as 'company-okta' or 'partner-google'
- Argus generates the SP values: ACS URL (https://argus.cremit.io/api/auth/sso/saml2/callback/{provider-id}) and Entity ID (https://argus.cremit.io)
Step 2: Create the SAML app in your IdP
The SP values from Step 1 go into your IdP's configuration.
- ACS URL / Reply URL: paste the value Argus generated
- Entity ID / SP Entity ID: https://argus.cremit.io
- NameID format: emailAddress
- Signature algorithm: SHA-256
- Optional attribute mapping: firstName, lastName, displayName (email comes from NameID)
Step 3: Return IdP metadata to Argus
- Download IdP metadata XML from your IdP, or copy the IdP Entity ID, SSO URL, and x509 signing certificate
- Back in Argus, either paste the metadata XML or fill in the IdP fields individually
- Set the Email Domain that routes to this provider (for example, `company.com`)
Step 4: Test and enable
- Click Test Login; Argus opens a new tab and runs through an SP-initiated SAML flow
- Resolve any issues shown in the test result
- Once the test succeeds, save the provider and flip it to Active
Verification
To confirm the integration is configured correctly:
- Test Login completes with an Argus session
- The expected email domain routes to the correct provider on the login page
- SAML assertions are accepted with SHA-256 signatures and valid NotBefore/NotOnOrAfter times
- Audit logs show SAML-Signed login events with the expected Subject
Troubleshooting
Issue: 'Invalid signature' on the Argus callback.
- Solution: The x509 certificate in Argus does not match what the IdP signs with. Re-upload the current signing certificate from your IdP, especially after any IdP certificate rotation.
Issue: Test Login fails with 'Clock drift too large.'
- Solution: Argus allows up to 2 minutes of clock skew on SAML assertions. Sync your IdP server time (NTP) or shorten the SessionNotOnOrAfter lifetime on the IdP side.
Key Benefits
- Works with any SAML 2.0-compliant IdP; no vendor lock-in
- Per-domain routing lets multiple IdPs coexist in one Argus tenant
- SP-initiated and IdP-initiated flows both supported
- Test Login catches configuration mistakes before end users see them