To set up SSO for your Zoho Desk Help Center using Zoho Vault:
Log in to your Zoho Vault account.
Navigate to Apps > Manage Apps.
Click Add Custom App
In the Application Settings tab, provide the following details:
Application Name: Provide a name for the application. For example, Zoho Desk.
Assertion Consumer Service URL - Paste the value for SAML Response URL that you copied from the SAML page in Zoho Desk.
Click Next.
You now need to provide the details of Zoho Vault (IdP) to Zoho Desk (SP).
In the IdP Details tab, do the following:
Copy the Identity Provider Single Sign-On URL and paste it into the Remote Login URL field in Zoho Desk SAML page.
Copy the Identity Provider Single Logout URL and paste it into the Remote Logout URL field in Zoho Desk SAML page.
Copy the Identity Provider Issuer and paste it into the Reset Password URL field in Zoho Desk SAML page.
Copy the Identity Provider Certificate and save it to a .txt file. Then upload the file into the Public Key field in Zoho Desk SAML page.
Click Next.
In the Manage App Access tab, select the list of users to whom you wish to give access to the SAML-enabled Help Center.
Click Save.
Okta
Okta is an identity management platform that can be configured to provide Single Sign-On (SSO) functionality for your Zoho Desk Help Center. With this configuration, users can seamlessly access both Okta and Zoho Desk Help Center using a single set of login credentials.
To set up SSO for your Zoho Desk Help Center using Okta:
Log in to your Okta account with administrative privileges.
Click the Applications tab.
Click Add Application and then click Create New App.
On the pop-up window, select the SAML 2.0 option and then click Create.
In the General Settings page, provide a name for the application. For example, Zoho Desk.
Click Next to continue.
In the Configure SAML page, do the following:
Single sign on URL - Paste the value for SAML Response URL that you copied from the SAML screen in Zoho Desk.
Audience URI (SP Entity ID) - Paste the value of SAML Response URL here as well.
Default RelayState - Paste the value for Default Relay State that you copied from the SAML screen in Zoho Desk.
Name ID format - Specify as EmailAddress.
Click Next to continue.
In the Feedback page, select I’m an Okta customer adding an internal app, and check the This is an internal app that we have created option.
Click Finish.
The Sign On section of your newly created application appears.
Click View Setup Instructions on the Sign On tab. It opens a new window to the IdP settings.
On the IdP Settings window, do the following:
Copy the Identity Provider Single Sign-On URL and paste it into the Remote Login URL field in Zoho Desk SAML page.
Copy the Identity Provider Issuer and paste it into the Remote Logout URL field in Zoho Desk SAML page.
Copy the Identity Provider Single Sign-On URL and paste it into the Reset Password URL field in Zoho Desk SAML page.
Copy the X.509 Certificate and save it to a .txt file. Then upload the file into the Public Key field in Zoho Desk SAML page.
Click Save.
Now you must select the users to whom you wish to give access to the SAML-enabled Help Center. To do this:
Click the Applications tab and select your newly created application on Okta.
Click on the Assignments section of the application.
Click Assign and then select Assign to People.
In the pop-up window, type your username into the search box and then click Assign next to your username.
Repeat this step to add more users.
Click Done to exit the assignment wizard.
Back in Zoho Desk, check the Enable Signup option on the SAML page to allow new users to log in for the first time and then click Save.
OneLogin
OneLogin is an identity management and Single Sign-On (SSO) solution that can be configured to provide seamless access to your Zoho Desk Help Center. By integrating OneLogin as the Identity Provider (IdP) with Zoho Desk Help Center as the Service Provider (SP) using SAML, users can securely log in to the Help Center with a single set of credentials.
Log in to your OneLogin account.
Go to Apps > Add Apps in the OneLogin administrator dashboard.
Search for 'SAML Test Connector' and select the first result from the search results.
It should be SAML Test Connector (IdP).
When the Configuration tab appears, provide a name for the application. For example, Zoho Desk.
Click Save.
Now, additional tabs appear, and you land on the Info tab.
Click the Configuration tab and enter the following details:
RelayState - Paste the value for Default Relay State that you copied from the SAML screen in Zoho Desk.
Recipient - Paste the value for SAML Response URL that you copied from the SAML screen in Zoho Desk.
ACS (Consumer) URL Validator - Paste the value of SAML Response URL here as well.
ACS (Consumer) URL - Paste the value of SAML Response URL here as well.
Once done, click the SSO tab and do the following:
Copy the SAML 2.0 Endpoint (HTTP) URL and paste it into the Remote Login URL field in Zoho Desk SAML page.
Copy the SAML 2.0 Endpoint (HTTP) URL and paste it into the Reset Password URL field in Zoho Desk SAML page.
Copy the SLO Endpoint (HTTP) URL and paste it into the Remote Logout URL field in Zoho Desk SAML page.
In the X.509 Certificate field, click View Details and save the contents to a .txt file. Then upload the file into the Public Key field in Zoho Desk SAML page.
Now you must select the users to whom you wish to give access to the SAML-enabled Help Center. To do this:
Click the Users tab and then click All Users to add the app to individual user accounts.
Click Save.
Back in Zoho Desk, check the Enable Signup option on the SAML page to allow new users to log in for the first time and then click Save.
Auth0
Auth0 is an identity management platform that can be configured to provide Single Sign-On (SSO) functionality for your Zoho Desk Help Center. To configure Auth0 for SSO with Zoho Desk Help Center, you will need to follow the below-given steps. This involves setting up a connection between Auth0 and Zoho Desk Help Center, configuring the necessary SSO settings, and mapping user attributes between the two systems.
Log in to your Auth0 account.
Go to Dashboard > Applications.
Click the + CREATE APPLICATION button on the right.
In the Name field, enter a name for the application. For example, Zoho Desk.
Select the type of Application you want to create.
Click Save.
Go back to Dashboard > Applications.
Find the application you just created in Step 4, and click the Gear icon corresponding to it.
Scroll down and click on the Advanced Settings link.
In the expanded window, click the Download Certificate button under the Certificates section.
The downloaded certificate will be a .pem file.
Now scroll back up and click on the Addons tab. Then enable the SAML2 WEB APP option.
You will see a screen asking you to provide additional configuration information.
On the Settings section of the screen, enter the following details:
Application Callback URL - Paste the value for SAML Response URL that you copied from the SAML screen in Zoho Desk.
Settings - Paste the below SAML configuration into this field.
{
"mappings": {
"given_name": "User.FirstName",
"family_name": "User.LastName"
},
"createUpnClaim": false,
"passthroughClaimsWithNoMapping": false,
"mapUnknownClaimsAsIs": false,
"mapIdentities": false,
"nameIdentifierFormat": "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
"nameIdentifierProbes": [
]
}
Click Save.
In the Addon SAML2 Web App popup, click the Usage tab and do the following:
Copy the Identity Provider Login URL and paste it into the Remote Login URL and the Reset Password URL fields in Zoho Desk SAML page.
Upload the certificate you saved in Step 10 into the Public Key field in Zoho Desk SAML page.
When done, click Save in Zoho Desk.
Your end users will now be redirected to the Auth0's sign-in page when signing in to the Help Center.
Google Workspace
Google Workspace, formerly known as G Suite, is a suite of cloud-based productivity and collaboration tools provided by Google. It can be configured to provide Single Sign-On (SSO) functionality for your Zoho Desk Help Center.
To configure Google Workspace for SSO with Zoho Desk Help Center:
Sign in to your Google Workspace admin console with an administrator account.
In the Admin console, click through to Apps > Web and mobile apps.
From the Add App drop-down list, select Add custom SAML app.
On the App Details page, do the following:
Enter a unique name for the app.
Upload an icon for the app (optional).
Click Continue.
On the Google Identity Provider details page, do the following:
Copy the SSO URL and paste it into the Remote Login URL and the Reset Password URL fields in Zoho Desk SAML page.
Your members redirect here when they sign in with an email address with your Google domain.
Download the Certificate and save it to a .txt file. Then upload the file into the Public Key field in Zoho Desk SAML page.
Click Continue.
In the Service Provider Details window, do the following:
Paste the value for SAML Response URL from SAML screen in Zoho Desk in the ACS URL field.
In the Entity ID field, paste the value for Entity ID (Issuer) that you copied from the SAML screen in Zoho Desk.
Note: If the IdP doesn't support a duplicate Entity ID, you can edit the Entity ID field in Zoho Desk to select the alternative and enter the same.
Select EMAIL as the Name ID Format.
Click Continue.
Skip the Attribute Mapping page.
Click Finish.
Note: Make sure to check whether the app is provisioned to users or groups.
Back in Zoho Desk, check the Enable Signup option on the SAML page to allow new users to log in for the first time and then click Save.
Microsoft Azure AD
Microsoft Azure Active Directory (Azure AD) is a cloud-based identity and access management service provided by Microsoft. It can be configured to provide Single Sign-On (SSO) functionality for your Zoho Desk Help Center.
To configure Azure AD for SSO with Zoho Desk Help Center, you will need to follow specific steps. This involves setting up an Enterprise Application in Azure AD, configuring the necessary SSO settings, and mapping user attributes between Azure AD and Zoho Desk Help Center.
Sign in to your Azure AD portal with an administrator account.
In the Azure portal, go to Manage Microsoft Entra ID and click View.
On the left navigation pane, select Enterprise Applications and then All Applications.
Click New Application button.
In the search box, type SAML SSO, select Confluence SAML SSO by Microsoft from result panel then click Add to add the application to your portal.
Navigate back to Enterprise Applications and then click Confluence SAML SSO by Microsoft app.
Click Single sign-on and then choose SAML for Mode.
On the Set up Single Sign-On with SAML page, click Edit icon to open Basic SAML Configuration dialog.
On the Basic SAML Configuration section, do the following:
In the Identifier text box, enter zoho.com
Note(1): If the IdP doesn't support a duplicate Identifier, you can edit the Entity ID field in Zoho Desk to select the alternative and enter the same.
Note(2): If you are on the .eu domain enter zoho.eu. Likewise, enter zoho.in if you are on the .in domain.
In the Reply URL text box, paste the value for SAML Response URL that you copied from the SAML screen in Zoho Desk.
In the Sign-on URL text box, paste the value for Redirect URL (For Microsoft Azure) that you copied from the SAML screen in Zoho Desk.
In the Relay State text box, paste the value for Default Relay State that you copied from the SAML screen in Zoho Desk.
Check the radio boxes for the entered values.
Click Save at the top of the page.
On the Set up Single Sign-On with SAML page, click the Edit button to open User Attributes & Claims dialog.
In the User Attributes section on the User Attributes & Claims dialog, do the following:
Click Edit icon to open the Manage user claims dialog.
From the Source attribute list, select the attribute value user.mail.
Click Save.
Go to SAML Signing Certificate menu and do the following:
In the Signing Option drop-down list, choose Sign SAML response.
This enables Azure AD to sign the SAML response with the X.509 certificate of the application.
Click Save to apply the new SAML signing certificate settings.
Download the certificate by clicking Certificate (PEM).
Go to Set up Confluence SAML SSO by Microsoft menu and do the following:
Copy the Login URL and paste it into the Remote Login URL and the Reset Password URL field in Zoho Desk SAML page.
Copy the Logout URL and paste it into the Remote Logout URL field in Zoho Desk SAML page.
Upload the certificate you saved in Step 12 into the Public Key field in Zoho Desk SAML page.
Click Save.
Back in Zoho Desk, check the Enable Signup option on the SAML page to allow new users to log in for the first time and then click Save.
Keycloak IDP
Keycloak is an Identity and Access Management (IAM) solution that can be configured to provide Single Sign-On (SSO) functionality for your Zoho Desk Help Center.
To configure Keycloak for SSO with Zoho Desk Help Center:
Log in to Keycloak and open the administration console.
Click Clients from the left panel, and then click Create to start creating a new client application.
On the Add Client page, enter the following details:
Client ID: Enter as zoho.com
Client Protocol: Select SAML from the drop-down menu
Client SAML Endpoint: Paste the value for Help Center SAML Response URL that you copied from the SAML page in Zoho Desk.
Click Save.
This will create the client and bring you to the client Settings tab.
On the Client Settings page, do the following:
Select email in the Name ID Format drop-down box.
Toggle Client Signature Required off.
Toggle Front Channel Logout off.
Click Save.
The next step is to enter details on the Zoho Desk Help Center SAML page.
Go to the URL: http://{your-keycloak-server:8080}/auth/realms/{your-realm}/protocol/saml/descriptor
To get the public key:
Copy the value of “dsig:X509Certificate” node in the XML configuration file.
Paste the value to a text file. Make sure you place the value between "-----BEGIN CERTIFICATE-----" and "-----END CERTIFICATE-----".
Save the text file.
To get the Remote Login URL and Reset Password URL:
Find the node SingleSignOnService with the attribute Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" in the XML file.
Copy the value of the location.
To get the Remote Logout URL:
Create an URL like http://{your-keycloak-server:8080}/auth/realms/{your-realm}/protocol/openid-connect/logout?redirect_uri={URL_encoded_Help Center URL}
Copy the value of the location.
Back in the Zoho Desk Help Center SAML page, do the following:
Paste the values for Remote Login URL, Remote Logout URL, and Reset Password URL.
Upload the saved text file into the Public Key field.
Click Save.
Your federated SAML SSO is ready for use.
Zitadel IDP
Zitadel is an Identity and Access Management (IAM) solution that can be configured to provide Single Sign-On (SSO) functionality for your Zoho Desk Help Center.
To configure Zitadel for SSO with Zoho Desk Help Center:
Log in to Zitadel with as an Administrator.
Go to the Projects tab and click New to create a new application.
In the Create Application page, do the following:
Enter your Application Name.
Choose SAML as the application type from the options provided.
Click Continue.
In the SAML configuration window, click Upload Metadata XML to upload SP metadata.
Refer the below-given sample SP meta data XML. You can edit and reuse this.
In the above-given sample SP meta data XML, you need to do some changes before reusing it:
Replace the Entity ID with the id that you have selected in the Zoho Desk SAML setting page.
In the Zoho Desk SAML Settings page, copy the SAML response URL and paste it in the AssertionConsumerService location.
Click Continue.
In the Overview window, click Create to create the SAML application.
Go to the Zoho Desk SAML Setup page and paste the below values in:
Remote Login URL: https://{your_instance_domain}/saml/v2/SSO
Reset Password URL: https://{your_instance_domain}/saml/v2/SSO
Remote Logout URL:https://{your_instance_domain}/ui/console/signedout
Go to "https://{your_instance_domain}/saml/v2/certificate" to download the public certificate and change the certificate format to .txt.
Navigate to the Zoho Desk SAML setup page and upload the downloaded public certificate in text format in the public key.
Click Save.
This will enable the SAML for the particular help center.
See Also: Configuring ADFS with SAML 2.0