You need an Enterprise License to avail this when self-hosting
Setting up SAML login
-
Set SAML_DATABASE_URL to a Postgres database. Please use a different database than the main Cal instance since the migrations are separate for this database. For example
postgresql://postgres:@localhost:5450/cal-saml
. If you are using a self-signed certificate for Postgres then use thesslmode=no-verify
query param in the database URL. For examplepostgresql://postgres:@localhost:5450/cal-saml?sslmode=no-verify
. - Set SAML_ADMINS to a comma separated list of admin emails from where the SAML metadata can be uploaded and configured.
- Create a SAML application with your Identity Provider (IdP) using the instructions here - SAML Setup
- Remember to configure access to the IdP SAML app for all your users (who need access to Cal).
- You will need the XML metadata from your IdP later, so keep it accessible.
- Log in to one of the admin accounts configured in SAML_ADMINS and then navigate to Settings -> Security.
- You should see a SAML configuration section, copy and paste the XML metadata from step 5 and click on Save.
- Your provisioned users can now log into Cal using SAML.
SAML Registration with Identity Providers
This guide explains the settings you need to use to configure SAML with your Identity Provider. Once this is set up you should get an XML metadata file that should then be uploaded on your Cal.com self-hosted instance.Note: Please do not add a trailing slash at the end of the URLs. Create them exactly as shown below.Assertion consumer service URL / Single Sign-On URL / Destination URL: https://<url for your self-hosted instance>/api/auth/saml/callback [Replace the placeholder with the URL for your self-hosted Cal instance] Entity ID / Identifier / Audience URI / Audience Restriction: https://saml.cal.com Response: Signed Assertion Signature: Signed Signature Algorithm: RSA-SHA256 Assertion Encryption: Unencrypted Name ID Format: EmailAddress Application username: email Mapping Attributes / Attribute Statements:
Name | Name Format | Value |
---|---|---|
firstName | Basic | user.firstName |
lastName | Basic | user.lastName |
Setting up OIDC login
- Set SAML_DATABASE_URL to a Postgres database. Please use a different database than the main Cal instance since the migrations are separate for this database. For example
postgresql://postgres:@localhost:5450/cal-saml
. If you are using a self-signed certificate for Postgres then use thesslmode=no-verify
query param in the database URL. For examplepostgresql://postgres:@localhost:5450/cal-saml?sslmode=no-verify
. - Set SAML_ADMINS to a comma separated list of admin emails who can configure the OIDC.
- Keep handy the Client Secret, Client ID and Well Known URL with you for the next step.
- Spin up cal.com on your server and login with the Admin user (the email ID of which was provided in step 2 for SAML_ADMINS environment variable).
- Visit
{BASE_URL}/settings/security/sso
and you should see something like this: - Click on Configure SSO with OIDC, and then enter the Client Secret, Client ID and Well known URL from the Step 3, and click save.
- That’s it. Now when you try to login with SSO, your OIDC provider will handle the auth.