Email addresses in and Tuple must match exactly. For example,
dev+tuple@company.com does not match dev@company.com. Verify your team’s email addresses before enabling SSO.Create a SAML app
After signing in to your Okta account, click Applications in the navigation bar and then click Create App Integration.
Select SAML 2.0 as the sign-in method.


Configure the app
Name the app “Tuple” and upload an icon, which you can download here.
Fill in the following fields:
Single sign on URLAudience URI (SP Entity ID)There are three additional attributes that Tuple requires:


email, first_name, and last_name.Set up SAML in Tuple
After finishing the install wizard, click View SAML Setup Instructions on the Sign On tab.
This provides the metadata needed to configure SAML in Tuple:Under Sign-in methods, set Required Authentication Provider to SAML SSO. The Update SAML Configuration form appears:
Fill in the values with your metadata:Select the Email Domain that SAML should apply to. Only domains with confirmed team members are available.Click Save as draft. Your draft is saved as a Pending Update alongside your current sign-in method, so no one on your team is affected yet.
Click Test to verify the configuration end-to-end. Tuple signs you in through so you can confirm that authentication succeeds before the change affects anyone else on your team.Once the test succeeds, click Publish to make the configuration live. Active Tuple sessions persist, but new sign-ins are routed through .Use Edit to tweak the draft, or Discard to throw it away without publishing.

- Identity Provider Single Sign-On URL
- Identity Provider Issuer URL
-
Downloaded certificate file

Only team owners can enable SAML. To find out who your team owner is, check your profile.



