Security Assertion Markup Language (SAML) is a standard of communication between Identity Providers (IDP) and Service Providers (SP) like Float!
Float allows companies to set up SAML to seamlessly onboard their employees to start spending on the platform.
Note: SAML is only available for Professional Plan Customers.
Important: If you are using SAML-SSO with your Float account, please ensure you have MFA disabled for your users! This will ensure users aren't required to double-authenticate to log in. You can verify this is disabled by following these steps:
- Navigate to 'Security' in the Settings page within Float
- Click the 'MFA' tile
- Ensure the MFA requirement for all users to set up is toggled 'OFF'
Navigate to the Settings Section within Float and Select Security Section within the Settings Page
Ensure that you’ve selected SAML and not MFA (Multi-Factor Authentication) as it’s a different authentication feature.
Add a domain you wish to be authenticated when logging in. For example:
Floats domain is floatcard.com so the domain we’re looking to authenticate is floatcard.com. The next time someone logs into Float using email@example.com, the domain will go through Floats SAML authentication.
Verify your domain through your domain host. You’ll need to add the record in the steps below to in order to successfully verify your domain
Copy the SP configuration info you'll need to enter in your IDP. The IT team will know where the configuration info should go in your IDP.
Based on your IDP, create (2) of the custom Float attributes required for your SAML integration to function. Note: Float does support other IDP providers outside of Google, Okta and Microsoft Azure
Once your IT team has configured your IDP, please provide Float with the following info:
Save your configuration and Test the SAML Sign In.
Once SAML is successfully enabled, toggle to enable all employees under your domain to sign in via SAML-SSO moving forward. You'll also be able to onboard new employees via SAML-SSO.