# OneLogin

{% hint style="success" %}
Please complete the steps in the [Admin Console Configuration](https://docs.keeper.io/en/sso-connect-cloud/admin-console-configuration) section first.
{% endhint %}

<figure><img src="https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MB_i6vKdtG6Z2n6zWgJ%2Fuploads%2FUdWU5GlxCoDZmlj8qRtc%2FOneLogin.jpg?alt=media&#x26;token=432f51f0-b53c-4b33-b505-6d408ce2ec24" alt=""><figcaption></figcaption></figure>

### OneLogin Setup:

1. Login to the OneLogin portal.

![Log into OneLogin.](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MFa7OBx-H73jy8tdAYu%2F-MFkb78tdbGqyRV_L4w5%2FOnelogin_login2.png?alt=media\&token=b8b1a312-f60f-49fc-84ac-294db3712e29)

2\. Select Administration to enter the admin section.

![](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MFa7OBx-H73jy8tdAYu%2F-MFkeabJ-gYGCjg0CbJF%2Fonelogin_Admin.png?alt=media\&token=5e71dd4a-13dc-4dce-a55e-e795cf35dbc2)

3\. From the onelogin menu select **Applications** then **Add App**.

![](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MFa7OBx-H73jy8tdAYu%2F-MFl8TqYYLy7DpN-TqyJ%2Fonelogin_Applications.png?alt=media\&token=7321da42-980e-4b33-9099-f077ba3b4131)

![](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MFa7OBx-H73jy8tdAYu%2F-MFl994hgwlxOr4xZOA7%2Fonelogin_AddApplications.PNG?alt=media\&token=94c3d3b7-d13e-4f6c-a9f6-cdc57654c1f5)

In the Search field, do a search for **Keeper Password Manager** and select it from the search result.

![Add Keeper Password Manager](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MWB2yGCI3fnhGAAUgE5%2F-MWB3LLrlOFl_XQ306ty%2FScreen%20Shot%202021-03-19%20at%2012.58.18%20PM.png?alt=media\&token=82fee455-03d8-494f-a7e1-6003c2429269)

4\. On the **Add Keeper Manager** screen click Save.

![](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MWB2yGCI3fnhGAAUgE5%2F-MWB44kEpskKnexfxiD3%2FScreen%20Shot%202021-03-19%20at%201.01.02%20PM.png?alt=media\&token=eb03285e-4a19-44a4-a766-ec910a47d23d)

5\. The next step is to download the SAML Metadata from OneLogin. Select the down arrow on the **MORE ACTIONS** button and select **SAML Metadata**.

![Save SAML Metadata](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MWB2yGCI3fnhGAAUgE5%2F-MWB4HQoYbSMpyZeTb1R%2FScreen%20Shot%202021-03-19%20at%201.02.25%20PM.png?alt=media\&token=3bc4d014-1bcb-4586-b4fc-89e9de7c45ef)

Drag and drop or browse to this saved file on the SAML Metadata Section of the Single Sign-On with SSO Connect™ Cloud section on the Keeper Admin Console.

![Upload Metadata](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MLTw2ADQ5jWlAJ6kN26%2F-MLU-bDKwQHYFzMzUW7-%2Fonelogin_metadata.png?alt=media\&token=ec35bb11-0dc6-4490-a3cd-f10603136f84)

6\. On the Keeper Admin Console, copy the Assertion Consumer Service (ACS) Endpoint field.

![](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MWB2yGCI3fnhGAAUgE5%2F-MWBDbkTGh8AiOju8T3A%2FScreen%20Shot%202021-03-19%20at%201.42.55%20PM.png?alt=media\&token=75e68344-ddc6-4c1a-aa10-602a4b169ab8)

7\. Back on the OneLogin Configuration tab, paste in the Keeper SSO Connect **Assertion Consumer Service (ACS) Endpoint** field and then click **Save**.

![Paste Assertion Consumer Service Endpoint](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MWB2yGCI3fnhGAAUgE5%2F-MWBDurFd-srOkthdvcG%2FScreen%20Shot%202021-03-19%20at%201.44.18%20PM.png?alt=media\&token=ca91142f-be4b-4e5b-a4d8-1e205469efb1)

8\. If SCIM is desired then go back on the Keeper Provisioning tab, click on "Add Method" and select SCIM. If not skip to step to step 12.

![](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MWB2yGCI3fnhGAAUgE5%2F-MWBED9tthKhIlPodv10%2FScreen%20Shot%202021-03-19%20at%201.45.05%20PM.png?alt=media\&token=2b27d99b-767f-4939-a986-366b2022a7db)

![Add SCIM Method](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MWB2yGCI3fnhGAAUgE5%2F-MWBEOg4DHE3q0U6alYk%2FScreen%20Shot%202021-03-19%20at%201.45.24%20PM.png?alt=media\&token=28bab277-7d6c-4788-8f37-0b3074fa030a)

9\. Click Generate then copy the URL and Token.

![Click Generate](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MWBFNv1OKqAsBZwBF1b%2F-MWBLjJRf1jAEGAWnUUu%2FScreen%20Shot%202021-03-19%20at%202.17.47%20PM.png?alt=media\&token=6f20208d-0084-442d-a629-55291d705171)

10\. Paste the "URL" into the **SCIM Base URL**, and paste the "Token" into the **SCIM Bearer Token**.

11\. On the Keeper Admin Console make sure to **Save** the SCIM token.

![](https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MB_i6vKdtG6Z2n6zWgJ%2F-MWB2yGCI3fnhGAAUgE5%2F-MWBCR5FwNOl6vEuKCi0%2FScreen%20Shot%202021-03-19%20at%201.04.14%20PM.png?alt=media\&token=fc9a2c40-42ab-4aca-9c67-70f494d3a037)

{% hint style="info" %}
For more detailed configuration of SCIM visit the [User and Team Provisioning section in the Enterprise Guide](https://app.gitbook.com/s/-LO5CAzpxoaEquZJBpYz/user-and-team-provisioning/onelogin-provisioning-with-scim)
{% endhint %}

12\. Click **Save** and the integration is complete.

#### Move existing users/initial admin to SSO authentication

Users created in the root node (top level) will need to be migrated to the sub node that the SSO integration was configured on. If users remain in the root node, they will be prompted for the master password when accessing the vault and/or admin console.

{% hint style="warning" %}
An admin can not move themselves to the SSO enabled node. It requires another admin to perform this action.
{% endhint %}

After the user is moved to the SSO enabled node, they need to log into the Keeper vault initially by selecting the "Enterprise SSO" pull down and inputting in the Enterprise Domain configured on the SSO integration. The user may get prompted to confirm by entering in the master password.

<figure><img src="https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MB_i6vKdtG6Z2n6zWgJ%2Fuploads%2FfFPNzWDvSwH48ebLJOeY%2FSSO_Login.png?alt=media&#x26;token=f7bc0249-986d-427d-9746-0e7873ff7840" alt=""><figcaption><p>Initially select 'Enterprise SSO Login'</p></figcaption></figure>

Once the user has authenticated with SSO, they only need to use their email address moving forward to initiate SSO authentication.

<figure><img src="https://2503956294-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MB_i6vKdtG6Z2n6zWgJ%2Fuploads%2FDrVwIHQiMQDtlxeJey0G%2Fvault_Login.PNG?alt=media&#x26;token=2e435451-c23e-41bd-91e2-8ec49a216c16" alt=""><figcaption></figcaption></figure>

They won't have to enter the Enterprise Domain. If typing in the email address and clicking Next does not route the user to the desired SSO, ensure that just-in-time provisioning is enabled in the Keeper SSO configuration and ensure that your email domain is reserved by Keeper. More information regarding routing and domain reservation [can be found here](https://app.gitbook.com/s/-LO5CAzpxoaEquZJBpYz/domain-reservation).


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.keeper.io/en/sso-connect-cloud/identity-provider-setup/onelogin-keeper.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
