This article provides instructions for configuring SAML Single Sign-On (SSO) for Aircall using Keycloak as your Identity Provider (IdP).
Important: These instructions apply only to companies that have had SAML Single Sign-On activated by Aircall. To request activation, please contact Customer Success team. This functionality is currently available to a limited number of customers.
Note: IDP-initiated SAML sign-in is not supported. Once SAML is configured, users must log in through the Aircall Dashboard or app login page using the Sign in with SSO option.
1. Create a new client
Steps:
- Open the Keycloak Administration Console.
- From the left-hand navigation menu, under Manage, select Clients.
- Click Create Client.
- In the Create a new app integration modal, select SAML as the client type.
- Enter the following values:
-
Client ID:
urn:amazon:cognito:sp:us-west-2_hZkGBmIsz -
Name:
AircallSSO
-
Client ID:
- Click Next.
- Under Valid redirect URIs, enter:
https://sso.aircall.io/saml2/idpresponse - Click Save.
2. Configure your new SAML client
Steps:
- Go to Clients > Client details, then select
urn:amazon:cognito:sp:us-west-2_hZkGBmIsz. - From the top tabs, select Keys.
- Disable Client signature required.
- Select the Client scopes tab.
- In the table, click on
urn:amazon:cognito:sp:us-west-2_hZkGBmIsz-dedicated. - Click Add predefined mapper.
- Choose X500 email, then click Add.
- After it appears in the table, click the X500 email mapper.
- Change the SAML Attribute Name to:
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress - Click Save.
3. Export the metadata
Steps:
- From the left-hand navigation menu, under Configure, select Realm settings.
- Locate the Endpoints section.
- Click SAML 2.0 Identity Provider Metadata to open the XML file.
- Save the file as
aircall-idp.xml.
For more information on SAML setup, refer to our Customer Success team.