Client ID
Single Sign-On
Login users using an external SAML identity provider (IDP). B2B apps can use this to allow their business customers or partners to provide SSO login for their members (see Organizations).
Request
Initiates an SSO login flow with an external identity provider (IDP). This results in a POST redirect to the IDP configured for the organization, which is determined based on the domain of the user's email address. Once the IDP authenticates the user, it will redirect back to the app with the authentication response so the app can complete the SSO flow.
Note:
- If the user isn't a member of an organization configured for SSO, an error is returned.
- If public sign-ups are enabled for the app, new users will be added to the app upon login.
- Sandbox environmenthttps://api.sbx.transmitsecurity.io/cis/v1/auth/sso/start
- Production environment (US)https://api.transmitsecurity.io/cis/v1/auth/sso/start
- Production environment (EU)https://api.eu.transmitsecurity.io/cis/v1/auth/sso/start
- Production environment (CA)https://api.ca.transmitsecurity.io/cis/v1/auth/sso/start
- Production environment (AU)https://api.au.transmitsecurity.io/cis/v1/auth/sso/start
- cURL
- Node.js
- Go
- JavaScript
- Java
- Python
curl -i -X GET \
'https://api.sbx.transmitsecurity.io/cis/v1/auth/sso/start?client_id=string&email=string&redirect_uri=string&org_id=string'Request
Initiates an SSO login flow with a SAML identity provider (IDP). This results in a POST redirect to the SAML IDP configured for the organization, which is determined based on the domain of the user's email address. Once the SAML IDP authenticates the user, it will redirect back to the app with the SAML response so the app can complete the SSO flow.
Note:
- If the user isn't a member of an organization configured for SAML SSO, an error is returned.
- If public sign-ups are enabled for the app, new users will be added to the app upon login.
- Sandbox environmenthttps://api.sbx.transmitsecurity.io/cis/v1/auth/sso/saml/start
- Production environment (US)https://api.transmitsecurity.io/cis/v1/auth/sso/saml/start
- Production environment (EU)https://api.eu.transmitsecurity.io/cis/v1/auth/sso/saml/start
- Production environment (CA)https://api.ca.transmitsecurity.io/cis/v1/auth/sso/saml/start
- Production environment (AU)https://api.au.transmitsecurity.io/cis/v1/auth/sso/saml/start
- cURL
- Node.js
- Go
- JavaScript
- Java
- Python
curl -i -X GET \
'https://api.sbx.transmitsecurity.io/cis/v1/auth/sso/saml/start?client_id=string&email=string&org_id=string'Request
Completes the SSO login using the SAML response received directly from the SAML IDP (via your ACS URL). If the user is authenticated and the SAML response is valid, Transmit will redirect to your redirect URI with a code that can be exchanged for a user token. If not, this API returns an error.
This should be called from the backend, using a client access token.
RelayState returned with the SAML response (only for SP-initiated flows). It's an opaque identifier used to maintain the state of the user session.
URI to redirect to upon completing the SSO login. This is the server GET endpoint used to call the token endpoint, and should accept code as a query parameter. This URI must also be configured as an allowed redirect URI for this client.
- Sandbox environmenthttps://api.sbx.transmitsecurity.io/cis/v1/auth/sso/saml/complete
- Production environment (US)https://api.transmitsecurity.io/cis/v1/auth/sso/saml/complete
- Production environment (EU)https://api.eu.transmitsecurity.io/cis/v1/auth/sso/saml/complete
- Production environment (CA)https://api.ca.transmitsecurity.io/cis/v1/auth/sso/saml/complete
- Production environment (AU)https://api.au.transmitsecurity.io/cis/v1/auth/sso/saml/complete
- cURL
- Node.js
- Go
- JavaScript
- Java
- Python
curl -i -X POST \
https://api.sbx.transmitsecurity.io/cis/v1/auth/sso/saml/complete \
-H 'Content-Type: application/json' \
-d '{
"SAMLResponse": "string",
"RelayState": "string",
"organization_id": "string",
"redirect_uri": "string"
}'{ "result": "string" }