Overview
Freed supports Single Sign-On (SSO) using the SAML 2.0 protocol, allowing your organization to securely manage user access through your Identity Provider (IdP), such as Okta or Microsoft Entra ID (formerly Azure AD).
SSO is not automatically enabled for Group Plans. To activate SSO for your group, please contact your Freed point of contact directly.
If your IdP does not support SAML, please reach out to your Freed point of contact to discuss alternative options.
Freed SAML Configuration Details
Here’s the information you’ll need when setting up a SAML app in your IdP:
Single Sign-On URL (ACS URL):
https://secure.getfreed.app/api/sso/saml
Audience URI (SP Entity ID):
urn:secure.getfreed.ai
Name ID Format:
EmailAddress
Step-by-Step Setup Instructions by Identity Provider
We’ve outlined specific setup instructions for the most commonly used IdPs:
Okta
Log in to Okta Admin Console
Go to:
https://<your-okta-domain>.okta.com/admin
Switch to the Classic UI if needed.
Create a New SAML App
General Settings
App name: Freed
Logo: Contact your Freed POC for a logo file
Click Next
Configure SAML Settings
Get the Metadata URL
Assign Users or Groups
Go to the Assignments tab
Click Assign > Assign to People or Assign to Groups
Ensure the Freed group admin is assigned to the app
Microsoft Entra ID (formerly Azure AD)
Access Microsoft Entra Admin Center
Go to: https://entra.microsoft.com
Select Microsoft Entra ID from the side menu
Create a New Enterprise App
Navigate to Enterprise Applications > + New Application
Click Create your own application
Name it Freed
Choose “Integrate any other application you don’t find in the gallery (Non-gallery)”
Click Create
Set Up SAML Sign-On
From the app's Overview, click Single sign-on
Choose SAML as the method
Edit SAML Configuration
Under Basic SAML Configuration, click Edit
Enter:
Identifier (Entity ID):
urn:secure.getfreed.ai
Reply URL (ACS URL):
https://secure.getfreed.app/api/sso/saml
Click Save
Get the Metadata URL
Scroll to the SAML Signing Certificate section
Copy the App Federation Metadata URL
This is what you’ll paste into Freed’s SSO settings
Assign Users or Groups
Go to Users and Groups
Click + Add user/group
Ensure the Freed group admin is assigned
Click Assign
Final Step: Enable SSO in Freed
Once your SAML app is ready and you’ve copied the Metadata URL, follow these steps to finish setup in Freed:
Log into your Freed admin account
Click the profile icon in the top-right corner
Select Group Settings
On the Group Settings page, enable "SSO Login for Group"
A new section will appear
Paste your SAML Metadata URL into the field labeled “Paste your SAML Metadata URL here”
Click Test
You’re All Set
Once the test is successful, SSO will be enabled for your Group. Users will now be able to log in using your organization’s credentials through your IdP.
If you run into any issues or need assistance with setup, feel free to contact your Freed point of contact. We’re happy to help.