postgresql://postgres:@localhost:5450/cal-saml
. If you are using a self-signed certificate for Postgres then use the sslmode=no-verify
query param in the database URL. For example postgresql://postgres:@localhost:5450/cal-saml?sslmode=no-verify
.
Note: Please do not add a trailing slash at the end of the URLs. Create them exactly as shown below.Assertion consumer service URL / Single Sign-On URL / Destination URL: https://<url for your self-hosted instance>/api/auth/saml/callback [Replace the placeholder with the URL for your self-hosted Cal instance] Entity ID / Identifier / Audience URI / Audience Restriction: https://saml.cal.com Response: Signed Assertion Signature: Signed Signature Algorithm: RSA-SHA256 Assertion Encryption: Unencrypted Name ID Format: EmailAddress Application username: email Mapping Attributes / Attribute Statements:
Name | Name Format | Value |
---|---|---|
firstName | Basic | user.firstName |
lastName | Basic | user.lastName |
postgresql://postgres:@localhost:5450/cal-saml
. If you are using a self-signed certificate for Postgres then use the sslmode=no-verify
query param in the database URL. For example postgresql://postgres:@localhost:5450/cal-saml?sslmode=no-verify
.{BASE_URL}/settings/security/sso
and you should see something like this: