docs/developing/guides/auth-and-provision/sso-setup.mdx
Cal.com supports both Security Assertion Markup Language (SAML) and OpenID Connect (OIDC), two of the industry's leading authentication protocols. We prioritize your ease of access and security by providing robust Single Sign-On (SSO) capabilities. Whether you're looking for the XML-based standard of SAML or the lightweight OIDC, our platform is equipped to integrate smoothly with your preferred identity provider, ensuring both convenience and security for your users.
This guide explains the settings you need to use to configure SAML with your Identity Provider. Once configured, obtain an XML metadata file and upload it on your Cal.com instance.
Note: Please do not add a trailing slash at the end of the URLs. Create them exactly as shown below.
Assertion consumer service URL / Single Sign-On URL / Destination URL: https://app.cal.com/api/auth/saml/callback
Entity ID / Identifier / Audience URI / Audience Restriction: https://saml.cal.com
Response: Signed
Assertion Signature: Signed
Signature Algorithm: RSA-SHA256
Assertion Encryption: Unencrypted
Name ID Format: EmailAddress
Application username: email
Mapping Attributes / Attribute Statements:
| Name | Name Format | Value |
|---|---|---|
| firstName | Basic | user.firstName |
| lastName | Basic | user.lastName |
</Step>
<Step title="Configure SSO with OIDC">
Click on Configure SSO with OIDC, enter the Client Secret, Client ID, and Well Known URL from Step 1, and click save.
</Step>
<Step title="Complete OIDC setup">
Now, when you try to login with SSO, your OIDC provider will handle the authentication.
</Step>