Email addresses in and Tuple must match exactly. For example,
dev+tuple@company.com does not match dev@company.com. Verify your team’s email addresses before enabling SSO.Create a SAML connector
After signing in to your OneLogin account, click Applications > Applications in the top navigation bar.
In the search field, enter 
Fill in any required metadata, upload company logos, and save the new application.

SAML Test and select SAML Test Connector (Advanced) from the results.

Configure Tuple's metadata
After saving, click Configuration in the left-hand sidebar.
Fill in the following fields:Audience (EntityID)RecipientACS (Consumer) URL ValidatorACS (Consumer) URLLogin URL

Attach required parameters
Navigate to the Parameters section in the sidebar and click the plus button to add new fields.Tuple requires three fields in the SSO response: 
When adding each field, check the Include in SAML Assertion checkbox.
Repeat for 
Once all required parameters are added, the screen looks like this:
email, first_name, and last_name.

first_name and last_name.

Enable SAML in Tuple
Download your X.509 certificate. Click SSO in the sidebar and find the link to View Details:
Click Download to save the certificate file.
Return to the SSO screen and locate the Issuer URL and SAML 2.0 Endpoint (HTTP).
Navigate to the Settings tab of the team management dashboard.Toggle Enable SAML to reveal the configuration form:
Fill in the values with your metadata:Click Save Configuration to enable SAML for your team. Active sessions persist, but new logins are routed through . Log in at production.tuple.app/saml_check/new to verify the configuration.



Only team owners can access this page. To find out who your team owner is, check your profile.


