Set up single sign-on (SSO) (2024)

Last updated: May 17, 2024

Single sign-on (SSO) allows you to give your team members one account for all of the systems your business uses. Security Assertion Markup Language, or SAML, is an open standard used for authentication. Based upon the Extensible Markup Language (XML) format, web applications use SAML to transfer authentication data between two parties - the identity provider (IdP) and the service provider (SP). If you have a HubSpot Enterprise account and have SAML-based SSO set up, you can require users to log in to HubSpot using their SSO credentials.

Please note: this setup process should be done by an IT administrator with experience creating applications in your identity provider account. Only super admins can set up SSO for your account.

General setup

  • Log in to your identity provider account.
  • Navigate to your applications.
  • Create a new application for HubSpot. To get the Audience URI and Sign on URL, ACS, Recipient, or Redirect values:
    • In your HubSpot account, click the settings settings icon in the top navigation bar.
    • In the left sidebar menu, selectSecurity > Settings & Activity.
    • UnderLogin, clickSet up Single Sign-on. In the right panel:
      • If you'd like to manually input the data from your identity provider, under the Most Identity Providers tab, click Copy next to the values as needed. Then, paste the values from your identity provider below. Click Verify.
      • If you are using Microsoft AD FS, under the Microsoft AD FS tab, click Copy next to the values as needed. Then, paste the values from your identity provider below. Click Verify.
      • If you'd like to upload an XML file to automatically populate your identity provider values, under the Federation Metadata tab, drag and drop or clickChoose a file to upload your federation metadata. Then, click Verify.

The navigation instructions and field names above may differ across identity providers. You can find more specific instructions for setting up applications in commonly used identity providers below:

  • Okta
  • OneLogin
  • Azure Active Directory
  • Google

If you're using Active Directory Federation Services, learn more about setting up single sign-on using AD FS.

Require SSO for all users

After setting up SSO, you can require all users to use SSO to log in to HubSpot.

  • In your HubSpot account, click the settings settings icon in the top navigation bar.
  • In the left sidebar menu, clickSecurity > Settings & Activity.
  • Under Login, select theRequire Single Sign-on checkbox.

Exclude specific users from SSO requirement

After setting up SSO, you can exclude specific users from the SSO requirement to allow them to also log in with their HubSpot user account.

  • In your HubSpot account, click the settings settings icon in the top navigation bar.
  • In the left sidebar menu, click Security > Settings & Activity.
  • Under Login, click Manage excluded users.

Set up single sign-on (SSO) (1)

  • In the dialog box, click the Choose users dropdown menu and select the users that will be able to log in with their HubSpot accounts. For example, you can select partners and contractors if they lack a SSO login.
  • Click Save.

Set up single sign-on (SSO) (2)

Please note: the user who selects the Require Single Sign-on checkbox will automatically be added to the excluded users. It is recommended to exclude at least one user with Super Admin permissions. In the event your identity provider is down, they can log in and clear the Require Single Sign-oncheckbox to allow all users to log in with their HubSpot accounts.

Instructions for specific identity providers

Okta

Please note: you need administrative access in your Okta instance. This process is only accessible in the Classic UI in Okta.

  • Log in to Okta. Make sure you are in the administrative instance of your Okta developer account.
  • Click Applications in the top navigation bar.
  • Click Add application.
  • Search for HubSpot SAML, then click Add.
  • On the General Settings screen, click Done.
  • On the application's details page, click the Sign On tab.
  • Under the "SAML 2.0 is not configured until you complete the setup instructions" message, click View Setup Instructions. This will open a new tab. Keep it open, then return to the original tab in Okta.
  • In the same tab, scroll down to Advanced Sign-on Settings and add your Hub ID in the Portal Id field. Learn how to access your Hub ID.
  • Navigate to your user settings. Assign the new app to any users that are also in your HubSpot account, including yourself.
  • Return to the View Setup Instructions tab. Copy each of the URLs and the certificate, and paste them in HubSpot in the Identity Provider Identifier or Issuer URL field, the Identity Provider Single Sign-On URL field, and the X.509 Certificate field.
  • Click Verify. You’ll be prompted to log in with your Okta account to finish the configuration and save your settings.

Once your SSO setup has been verified, navigate to https://app.hubspot.com/login/sso and enter your email address. HubSpot will look up your portal's single sign-on configuration and send you to your identity provider to sign in. You’ll also see a Log in with SSO button when visiting a direct link to your account.

OneLogin

Please note: you need administrative access in your OneLogin instance to create a new SAML 2.0 application in OneLogin, as required.

  • Log in to OneLogin.

  • Navigate to Apps.

  • Search for HubSpot.

  • Click the app that states "SAML2.0".

  • In the upper right, click Save.

  • Click the Configuration tab.

  • In the HubSpot Account ID field, add your Hub ID. Learn how to access your Hub ID.

  • Click theSSOtab.
  • Copy the following fields from OneLogin and paste them into the corresponding fields of the SSO setup panel in HubSpot:
    • Copy the value underIssuer URL and paste it into Identity Provider Identifier or Issuer URL.
    • Copy the value underSAML 2.0 Endpoint (HTTP)and paste it into Identity Provider Single Sign-on URL.
    • UnderX.509 Certificate, clickView Details, then copy the certificate and paste it into X.509 Certificate.

Set up single sign-on (SSO) (3)

  • In the upper right of your OneLogin account, click Save.

Once your SSO setup has been verified, navigate to https://app.hubspot.com/login/sso and enter your email address. HubSpot will look up your portal's single sign-on configuration and send you to your identity provider to sign in. You’ll also see a Log in with SSO button when visiting a direct link to your account.

Microsoft Entra ID

For Microsoft Entra ID (formerly Azure Active Directory) users, install the HubSpot app in the Microsoft Azure Marketplace and follow Microsoft's instructions to set up the integration. This will allow you to use Microsoft Entra ID to manage user access and turn on single sign-on with HubSpot.

Once your SSO setup has been verified, navigate to https://app.hubspot.com/login/sso and enter your email address. HubSpot will look up your portal's single sign-on configuration and send you to your SSO provider to sign in. You’ll also see a Log in with SSO button when visiting a direct link to your account.

Google

Check out Google's instructionson how you can set up HubSpot single sign-on with G-Suite as your identity provider.

Once your SSO setup has been verified, navigate tohttps://app.hubspot.com/login/ssoand enter your email address. HubSpot will look up your portal's single sign-on configuration and send you to your SSO provider to sign in. You’ll also see aLog in with SSO button when visiting a direct link to your account.

FAQs

Which binding does HubSpot use as a SAML service provider?

HubSpot uses HTTP Post.

I’m using Active Directory Federation Services. What should I use as my relying party trust (RPT)?

Learn more about setting up single sign-on using ADFS.

Which username format should I set in my SAML application?

HubSpot users are identified by email address. Ensure that your IDP is sending a nameID in email format that corresponds with their HubSpot user’s email address.

Which signing algorithm does HubSpot support?

Please note: After March 31, 2023, HubSpot will stop supporting SHA-1 for new SSO connections. Any existing SSO connections that use SHA-1 may still work until HubSpot stops supporting SHA-1 for all SSO connections on June 30, 2023. If you are using SHA-1, you will need to migrate to SHA-256 by June 30, 2023.

HubSpot supports only SHA-256 as signing algorithms. You need to sign your requests with SHA-256.

Which format should I provide my x509 certificate in?

HubSpot requires a PEM format x509 certificate. You should copy the text contents of the PEM file into the x509 certificate field in HubSpot. The value should also include the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE-----.

Can I turn on two-factor authentication, required two-factor authentication, SSO, and required SSO at the same time?

Yes. When you have two-factor authentication turned on, it's active on any login with your HubSpot username and password. Enabling 2FA in HubSpot does not prevent you from logging in using Google's 2FA or SSO. Therefore, if users are excluded from the SSO requirement, you can require HubSpot's 2FA to ensure that any logins that bypass SSO go through 2FA or Google.

If you enable 2FA for your Google account, this is separate from your HubSpot setup. However, when you log into HubSpot with your Google account, Google's 2FA will protect your HubSpot account.

If you have two-factor authentication and SSO required or enabled in your account at the same time, the following will occur:

  • If you're required to log into your account with SSO, your2FA for HubSpot will stillbe prompted.
  • If your account requires SSO, but you're excluded, you can log in with either 2FA or the Login with Google or Login with Microsoft options.
  • If you're required to log in with 2FA and no SSO is set up, you can log in with either 2FA or the Login with Google or Login with Microsoft options.
  • If your account has no requirements but has enabled SSO, you can log in with any method including SSO.

Set up single sign-on (SSO) (2024)
Top Articles
Latest Posts
Article information

Author: Jonah Leffler

Last Updated:

Views: 6172

Rating: 4.4 / 5 (65 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Jonah Leffler

Birthday: 1997-10-27

Address: 8987 Kieth Ports, Luettgenland, CT 54657-9808

Phone: +2611128251586

Job: Mining Supervisor

Hobby: Worldbuilding, Electronics, Amateur radio, Skiing, Cycling, Jogging, Taxidermy

Introduction: My name is Jonah Leffler, I am a determined, faithful, outstanding, inexpensive, cheerful, determined, smiling person who loves writing and wants to share my knowledge and understanding with you.