Skip to main content
All CollectionsTechnical Set Up & Troubleshooting
Freed SSO Setup (Advanced Instructions)
Freed SSO Setup (Advanced Instructions)
Updated this week

Overview
Freed supports Single Sign-On (SSO) using the SAML 2.0 protocol, allowing your organization to securely manage user access through your Identity Provider (IdP), such as Okta or Microsoft Entra ID (formerly Azure AD).

SSO is not automatically enabled for Group Plans. To activate SSO for your group, please contact your Freed point of contact directly.

If your IdP does not support SAML, please reach out to your Freed point of contact to discuss alternative options.

Freed SAML Configuration Details

Here’s the information you’ll need when setting up a SAML app in your IdP:

  • Single Sign-On URL (ACS URL):
    https://secure.getfreed.app/api/sso/saml

  • Audience URI (SP Entity ID):
    urn:secure.getfreed.ai

  • Name ID Format:
    EmailAddress

Step-by-Step Setup Instructions by Identity Provider

We’ve outlined specific setup instructions for the most commonly used IdPs:

Okta

  1. Log in to Okta Admin Console

    • Go to: https://<your-okta-domain>.okta.com/admin

    • Switch to the Classic UI if needed.

  2. Create a New SAML App

    • Navigate to Applications > Applications

    • Click Create App Integration

    • Choose:

      • Platform: Web

      • Sign-on Method: SAML 2.0

    • Click Next

  3. General Settings

    • App name: Freed

    • Logo: Contact your Freed POC for a logo file

    • Click Next

  4. Configure SAML Settings

    • Single Sign-On URL: https://secure.getfreed.app/api/sso/saml

    • Audience URI (SP Entity ID): urn:secure.getfreed.ai

    • Name ID format: EmailAddress

  5. Get the Metadata URL

    • Go to Applications > Your App > Sign On tab

    • Scroll to the SAML 2.0 section

    • Copy the Metadata URL (e.g., https://your-okta-domain.okta.com/app/.../sso/saml/metadata)

    • You’ll need this in Freed’s admin dashboard

  6. Assign Users or Groups

    • Go to the Assignments tab

    • Click Assign > Assign to People or Assign to Groups

    • Ensure the Freed group admin is assigned to the app

Microsoft Entra ID (formerly Azure AD)

  1. Access Microsoft Entra Admin Center

  2. Create a New Enterprise App

    • Navigate to Enterprise Applications > + New Application

    • Click Create your own application

    • Name it Freed

    • Choose “Integrate any other application you don’t find in the gallery (Non-gallery)”

    • Click Create

  3. Set Up SAML Sign-On

    • From the app's Overview, click Single sign-on

    • Choose SAML as the method

  4. Edit SAML Configuration

    • Under Basic SAML Configuration, click Edit

    • Enter:

      • Identifier (Entity ID): urn:secure.getfreed.ai

      • Reply URL (ACS URL): https://secure.getfreed.app/api/sso/saml

    • Click Save

  5. Get the Metadata URL

    • Scroll to the SAML Signing Certificate section

    • Copy the App Federation Metadata URL

    • This is what you’ll paste into Freed’s SSO settings

  6. Assign Users or Groups

    • Go to Users and Groups

    • Click + Add user/group

    • Ensure the Freed group admin is assigned

    • Click Assign

Final Step: Enable SSO in Freed

Once your SAML app is ready and you’ve copied the Metadata URL, follow these steps to finish setup in Freed:

  1. Log into your Freed admin account

  2. Click the profile icon in the top-right corner

  3. Select Group Settings

  4. On the Group Settings page, enable "SSO Login for Group"

    • A new section will appear

  5. Paste your SAML Metadata URL into the field labeled “Paste your SAML Metadata URL here”

  6. Click Test

    • This will redirect you to your IdP to test the SSO connection

    • A green checkmark will appear if the connection is successful

You’re All Set

Once the test is successful, SSO will be enabled for your Group. Users will now be able to log in using your organization’s credentials through your IdP.

If you run into any issues or need assistance with setup, feel free to contact your Freed point of contact. We’re happy to help.

Did this answer your question?