SAML-based Single Sign-On can be used only with POEditor organizations that have an Enterprise plan.
To set up SAML-based SSO login for a POEditor organization, follow the steps described in this article.
Setting up the SAML app in Entra
In Microsoft Entra, you will need to:
1) Create a (non-gallery) Enterprise app for POEditor. Navigate to Applications > Enterprise applications and click on New application.
Give your app a name (this is mandatory) and check the option "Integrate any other application you don't find in the gallery (Non-gallery)".
2) Configure the Entra app for POEditor. For this, you need to assing the desired users and/or groups to the app and to set up SSO.
Select SAML as single sign-on method and make the following configuration:
- in Identifier (EntityID) add the Entity ID from POEditor
- in Reply URL add the ACS URL from POEditor
- in Sign on URL add the Sign on URL in POEditor (which you will receive at the final step when setting up SSO for your organization).
3) Set up the attributes and claims. The POEditor localization platform has the following attribute mapping:
- email for user.mail
- firsName for user.givenname
- lastName for user.surname
- teams for user.groups (optional)
- userID for user.userprincipalname
What you need to set up in POEditor
In Organization Settings > Organization > Single Sign-On, you will need to add:
1) a Default Team, which is the POEditor team where the users from your identity provider will be added, unless you already have them grouped in your IdP and send them as such to our platform, in which case each group will create a team in POEditor.
2) the SAML File Content (the content of the SAML file from Microsoft Entra), which you can find in SAML Certificates > App Federation Metadata Url or XML.
Simply copy the content of the XML to the dedicated field in POEditor and click Enable Single Sign On (SSO).
Once everything is properly set up in both the POEditor localization platform and in Microsoft Entra, the users added to your IdP can login to POEditor using the Sign in URL.
You can restrict access to your organization's assets for users without SSO if you enable the Require SSO option in the Organization Settings.