This guide provides step-by-step instructions for configuring Single Sign-On (SSO) between RapidIdentity and your FMX application using SAML 2.0.Important: This document covers SSO configuration only. User provisioning and deeper RapidIdentity integrations are managed separately within RapidIdentity.OverviewIdentity Provider (IdP): RapidIdentityService Provider (SP): FMXProtocol: SAML 2.0Once configured, users will be able to log in to FMX using their RapidIdentity credentials.PrerequisitesBefore you begin, ensure the following:You have administrator access to RapidIdentitySAML SSO is enabled for your FMX tenantYou know your FMX hostname (for example: https://hostname.gofmx.com)Users who will access FMX already exist in FMX and RapidIdentityFMX SAML Configuration ValuesYou will use the following FMX values when configuring RapidIdentity:Audience / Entity IDhttps://hostname.gofmx.com/Assertion Consumer Service (ACS) / Reply URLhttps://hostname.gofmx.com/login/saml2/callbackRecipienthttps://hostname.gofmx.com/login/saml2/callback Step 1: Create a SAML Application in RapidIdentityLog in to the RapidIdentity Admin PortalNavigate to Applications or SAML Applications (menu names may vary)Select Create New Application or Add ApplicationChoose SAML 2.0 as the application typeStep 2: Configure SAML Settings in RapidIdentityWhen configuring the SAML application, enter the FMX values listed above.Required SettingsEntity ID / Audience:https://hostname.gofmx.com/ACS / Reply URL:https://hostname.gofmx.com/login/saml2/callbackRecipient URL:https://hostname.gofmx.com/login/saml2/callbackSAML Response: SignedAssertion: Signed (recommended)NameID ConfigurationNameID Format: Email AddressNameID Source: User EmailThis ensures FMX can uniquely identify users by email address.Step 3: Configure User Attributes (Claims)FMX requires the user’s email address and recommends sending first and last name attributes.Required Attributeemail → User EmailRecommended AttributesfirstName → User First NamelastName → User Last NameAttribute naming may vary depending on your RapidIdentity configuration.Step 4: Obtain RapidIdentity IdP MetadataAfter saving the SAML application, collect the following RapidIdentity values:Identity Provider SSO URLIssuer / IdP Entity IDX.509 Signing CertificateYou will provide these values to FMX to complete the setup.Step 5: Configure SSO in FMXProvide the following RapidIdentity details to FMX (or to FMX Support):Identity Provider SSO URLIdP Issuer / Entity IDX.509 Signing CertificateOnce these values are configured, FMX will enable SAML SSO for your tenant.Step 6: Assign Users in RapidIdentityEnsure users are assigned to the FMX SAML application in RapidIdentity. Only assigned users will be able to authenticate via SSO.Step 7: Test the SSO ConfigurationWe recommend testing with a small set of users before full rollout.Test OptionsIdP-initiated login: Launch FMX from the RapidIdentity application portalSP-initiated login: Log in from the FMX login page using the SSO optionIf login fails, verify:Entity ID and ACS URL match exactlyUsers are assigned to the applicationThe correct signing certificate is configuredTroubleshooting TipsInvalid Audience error: Verify the Entity ID matches FMX exactlyUser not found: Confirm the email in RapidIdentity matches the user email in FMXSignature errors: Ensure assertions are signed and the correct certificate is usedNeed Help?If you need assistance completing your RapidIdentity SSO setup, contact FMX Support and include:Your FMX tenant URLRapidIdentity IdP metadata (SSO URL, Issuer, Certificate)Any error messages or screenshots Was this article helpful? 0 out of 0 found this helpful