SSO Setup Guide
GSuite SAML Setup Guide

SAML Configuration for GSuite on DMARC Defender

SAML SSO Setup Steps in GSuite Admin Console
- In your GSuite Admin Console, navigate to "Apps" > "Web and mobile apps" and click "Add App" > "Add custom SAML app".
- Enter an application name (e.g. "DMARC Defender") and click "Continue".
- On the "Google IdP Information" page, note the "SSO URL", "Entity ID", and download the IdP metadata XML file. You will need this information to configure DMARC Defender.
- Click "Continue" to go to the "Service Provider Details" page. Here, you will enter the ACS URL and Entity ID from DMARC Defender. You can find this information in the SSO settings page in DMARC Defender. Click Save.
- Go back to the GSuite dashboard for DmarcDefender and click "User Access". Make sure to select "ON for everyone" to allow all users in your GSuite organization to access DMARC Defender using SSO.
- Wait a few minutes for the changes to propagate, then try clicking "Test Login" in the GSuite dashboard. If that is successful, try to log in to DMARC Defender at /login-sso with your domain. If that also works, then you have successfully set up SSO with GSuite!
Okta SAML Setup Guide

Create a new SAML application in Okta.

Set the Single sign-on URL, Audience URI, Name ID email format, and Application username.

Copy the Okta SSO URL, issuer, and signing certificate back into DMARC Defender.

Fill in Idp Entity ID, Entry Point, and the signing certificate from Okta into DMARC Defender, then save the provider.

After saving the SAML provider, validate your domain by setting a DNS TXT record.
- Create a new SAML 2.0 application in Okta.
- In Okta, set the ACS URL and Audience URI to the values shown in DMARC Defender.
- Use email address as the Name ID and assign the app to the users who should be able to sign in.
- Copy the Okta SSO URL, issuer, and signing certificate into DMARC Defender, save the provider, and test sign-in at /login-sso.
Auth0 OIDC Setup

Create a Regular Web Application in Auth0.

Copy the client ID and client secret and domain (as URL) from Auth0 into DMARC Defender.

Fill in the Auth0 domain, client ID, and client secret into DMARC Defender, save the provider.

Make sure to add the DMARC Defender callback URL as an allowed callback URL in your Auth0 application settings.