Applies to

  • Enterprise


Who can use this capability

System Admins with an IT Administrator can set up SAML 2 for SSO with Smartsheet

Set up SAML 2 for single sign-on to Smartsheet


  • Smartsheet
  • Enterprise


System Admins with an IT Administrator can set up SAML 2 for SSO with Smartsheet

When you set up a SAML-based SSO with Smartsheet 

You’ll need to do the following: 

  • Set up your organization’s Identity Provider (IdP) to communicate with Smartsheet. 
  • Add a record to your organization’s Domain Name System (DNS).
    • You may need to loop in an internal technical resource for assistance with setup and maintenance of this feature.

To successfully set up SAML 2 SSO with Smartsheet for the US government, there are some requirements and settings you must apply.

Keep these things in mind

  • Smartsheet supports Service-Provider-initiated SSO. If you’re configuring an IdP-initiated SSO, work with your IdP.
  • You can use more than one SSO IdP at the same time.

What you need to set up Smartsheet with your IdP

Using the metadata provided, configure a Relying Party within your IdP. The process for configuring a Relying Party may vary for every IdP. Consult your IdP’s documentation for more information.

Due to its security vulnerabilities, the SHA1 certificate algorithm has been deprecated. You must ensure you’re not using an SSL certificate which is signed using SHA1.

SAML exchange process 

Smartsheet requires the following attributes in the SAML exchange process:

  • Persistent ID: urn:oasis:names:tc:SAML:2.0:nameid-format:persistent 
  • Email address:

Keep these things in mind

  • The first assertion must have a Persistent ID that’s the same for each person whenever they sign in. Your email address can be a Persistent ID, but the Email address claim still needs to be passed in the assertion process. For a sample assertion and a complete list of Smartsheet’s supported claim formats, see the SAML Assertion: Supported Claims Examples in Smartsheet article.
  • The Persistent ID can be defined in the NameID (subject) element of the assertion.
  • If the assertion doesn't have a NameID (subject) element, you can use one of the attributes defined in the Supported Claims article.

The following attributes are recommended but optional: 

  • Given Name: 
    • This represents the user's first name.
  • Surname: 
    • This represents the user's last name.

Some SAML services may ask for additional information when you configure them with Smartsheet: 

  • Assertion Consumer Service (ACS) URL: 
    On EU accounts, use
  • Audience Restriction:
    On EU accounts, use

Enter email addresses in lowercase. Capital letters can prevent matching of emails between your SAML provider and Smartsheet.

Configure for use with your SAML IdP

Before proceeding, ensure you meet the requirements to configure SAML-based SSO for your account.

Open the SAML Administration form

Here’s how to establish a connection between your IdP and Smartsheet:

  1. On the left Navigation Bar, select Account
  2. In the Account menu, select Plan & Billing Info.
  3. In the Account Administration form, select Security Controls
  4. In the Authentication section, select Edit.
  5. Select not configured.


After doing these steps, the SAML Administration form will appear.

Configure SSO with your IdP

Follow these steps to configure SAML with one or more IdPs:

  1. Select Add IdP.

  2. Enter a nickname for your IdP. 
  3. Obtain the IdP metadata; then, copy it.
    Consult your IdP’s documentation to determine how to obtain the IdP metadata.
  4. In the IdP Metadata text box, paste the IdP Metadata. 
  5. Copy the SSO URL; then, paste it in your IdP.
  6. Select Save​.
    • After saving the changes you made, Smartsheet will validate the metadata.
      If the validation is successful, the Edit IdP ​form appears. If you receive an error, check out our SAML Frequently Asked Questions and Common Errors article.
      You can add a CNAME that’ll direct people to a friendly URL when they sign in. See the Direct people to sign in at a friendly CNAME URL section below for more information.
  7. To enable the IdP for use with Smartsheet, select Activate. The IdP status will change from Inactive to Active, Default.
  8. To enable SAML for your organization, in the Authentication ​form, select SAML
    There must be at least one active IdP prior to enabling SAML
  9. Select Save.

That’s it! Now people in your account can use their company credentials to sign in to Smartsheet.

Configure additional IdPs

While most organizations only need a single active IdP, there’s no limit to the number of IdPs you can add.

To edit or add additional IdPs, next to the SAML checkbox, select edit configuration. The SAML Administration form appears for you to add additional IdPs or edit existing ones you’ve already set up.

If you have more than one active IdP, people signing in via SAML will authenticate against the default IdP. To make an IdP the default, in the Edit IdP ​form, select Make Default.


Direct people to sign in at a friendly CNAME URL

Smartsheet provides the default SSO URL​ for your organization, which is a one-­step link to sign in to Smartsheet. You might want to add a CNAME with a friendly, more company-specific URL instead.

Don’t type in the CNAME field of the Edit IdP form, because that will cause login issues. Instead, use a CNAME created by your company and have that point to

  1. In your domain, create a CNAME DNS record and point it at For example, IN CNAME
  2. In the Edit IdP ​form, enter the CNAME
  3. Select Add​. 
    It may take up to one hour for your CNAME address to authenticate.​​​


Removing a user’s SSO access alone isn’t enough to prevent them from accessing Smartsheet. To fully prevent a user from accessing Smartsheet, you must completely delete that user from your organization’s Smartsheet account.

Different SAML configuration states 

SAML will be in one of the following states:

  • Not configured​: There are no active IdPs. 
  • Disabled​: There is at least one active IdP. Also, in the Authentication form, the SAML checkbox isn’t selected.
  • Enabled​: There is at least one active IdP. Also, in the Authentication form, the SAML checkbox is selected. Your IdP will be in one of three states: 
    • Not configured​: Security certificate is expired 
    • Inactive​: Valid metadata, valid security certificate 
    • Active​: Valid metadata, valid security certificate, not sharing entity ID with another active IdP on your account, and activated
Was this article helpful?