Topic
This article explains how to enable an IDP (identity provider) initiated login with SAML for NinjaOne.
Environment
NinjaOne Identity Access Management (IAM)
Description
IDP-initiated SAML login is now supported by NinjaOne. There are a few things to consider when enabling this option.
- IDP-initiated SAML: This is a new option offered by NinjaOne. You can use an IDP (whether via an icon from an Application Catalog or direct link) to log in to NinjaOne. Your IDP may or may not require multi-factor authentication (MFA), based on the Bypass MFA configuration.
- SP-initiated SAML: This option was previously supported by NinjaOne. You would access NinjaOne first and were redirected to your IDP to login, and then you would navigate back to NinjaOne.
By default, IDP-initiated SAML is disabled for existing and new NinjaOne IDP configurations. To perform IDP-initiated logins, enable the Enable IdP-initiated login toggle switch when configuring your IDP. When this option is disabled and you attempt an IDP-initiated login, you will see a generic error on the login page. Submit the Incident ID to NinjaOne Support to resolve the specific reason for the error.

Index
- Create a New Unique Identifier for Identity Provider Configurations
- IDP-initiated SAML Configuration for Branded Divisions
- Additional Resources
Create a New Unique Identifier for Identity Provider Configurations
When configuring a new IDP in NinjaOne, you will see a new Unique identifier included. The purpose of this Unique identifier is to allow the creation of new NinjaOne from different divisions in the same IDP (if you have multiple divisions). The Unique identifier will always be the same for the same division. It will be included at the end of the SP identifier and Reply URL(s).

IDP-initiated SAML Configuration for Branded Divisions
If you want the IDP-initiated login to use a branded URL, set up your IDP application configuration to use the branded Assertion Consumer Service (ACS) URL as the default. You can use the following categories for guidance:
Configuring a Branded URL for IDP-initiated in Entra
For the Reply URL (Assertion Consumer Service URL) in Azure, configure the URL you want IDP-initiated logins to land on to be the default. NinjaOne recommends that you configure both the native and branded ACS URLs to support SP-initiated from both starting points.

Additional Resources
To learn more about NinjaOne's identity services, refer to Identity Authentication and Management: Resource Catalog.
To learn more about enabling SAML for Okta, refer to Configuring NinjaOne SAML in Okta.