Skip to main content

Set Up Torq SSO: OneLogin SAML 2.0

Follow this guide to set up Single Sign-On (SSO) with OneLogin using the SAML 2.0 protocol.

Updated over a month ago

To configure SSO using OneLogin as the IdP and SAML 2.0 as the authentication and authorization protocol, you need to perform several steps in Torq and several in OneLogin.

Important!
Before getting started, make sure you understand how to prevent user lockouts by reviewing this KB article.

Set up SSO in Torq

Sign in to Torq as an Owner to perform the following steps.

  1. Access SSO Settings: Go to Settings > Security > Configure SSO.

  2. Select Protocol and Identity Provider: In the IdP Selection section, choose SAML 2.0 as the protocol and select OneLogin as your Identity Provider.

  3. Click Next to continue.

  4. Enter IdP Setup Details: In the IdP Setup section, fill in the following fields with the values obtained from OneLogin, then click Next.

Field

Value

Audience Restriction

torq.io

Login Redirect URL

US: https://app.torq.io/__/auth/handler
EU: https://eu.app.torq.io/__/auth/handler

Sign-On URL

Copied from OneLogin

Issuer URL

Copied from OneLogin

Public Certificate

Copied from OneLogin

When using Safari v16.1 or newer, the Login Redirect URL must be:
https://app.torq.io/__/auth/handler
If this value differs, contact Torq Support to update the URL for your workspace before continuing.

Create New SAML 2.0 Application in OneLogin

Perform the following steps in OneLogin to create a new SAML 2.0 application for Torq.

  1. Access Applications: In your OneLogin admin portal, go to Applications from the top navigation menu.

  2. Add a New Application: Click Add App to create a new application.

  3. Search for the Connector: In the search bar, type SAML Custom.

  4. Select the Connector: From the list of results, select SAML Custom Connector (Advanced) to begin configuring your SAML 2.0 application.

    onelogin-saml-app
  5. Enter a Name for the Application: Provide a name for your new application.

    Use Torq as the application name for consistency and easy identification.

  6. Adjust Application Visibility: Set the application to not be visible in the user portal.
    Note: IdP-initiated SAML 2.0 flows are not currently supported in Torq, so users should not launch the application directly from the OneLogin portal.

  7. Save Your Settings: Click Save to apply your configuration and continue to the SSO setup.

Screenshot of setting the application to not be visible in the portal.

Configure the OneLogin Application Settings

  1. Open the Configuration Tab: In your OneLogin application, go to the Configuration tab.

  2. Apply SAML 2.0 Settings: Enter the following values:

Field

Value

Audience

torq.io

Recipient

Login Redirect URL copied from the IdP Connection form in Torq.

ACS (Consumer) URL Validator

Login Redirect URL used above.

ACS (Consumer) URL

Login Redirect URL used above.

Login URL

https://app.torq.io/auth/SSOSignIn (EU region: https://app.eu.torq.io/auth/SSOSignIn)

SAML Initiator

Service Provider

SAML NameID Format

Email

SAML Issuer Type

Specific

SAML Signature Element

Assertion

Send NameID Format in SLO Request

✅ Select this option

Screenshot of configuring settings for the application in OneLogin.

Add Attribute Mappings in OneLogin

  1. Open the Parameters Tab: In your OneLogin application, go to the Parameters tab.

  2. Add Attribute Mappings: For each parameter, click Add parameter and configure it as shown below.
    Be sure to select Include in SAML assertion for all parameters.

Parameter Name

Mapped To

Include in SAML Assertion

Additional Settings

First Name

first_name

Last Name

last_name

User Roles

groups

Select Multi-value parameter option

Screenshot showing how to do name mapping for the app.

Screenshot of creating the groups field for the app.

Screenshot of selecting the user roles to add to the group.

Summary of the attribute mapping

Complete SSO Setup in Torq

Perform these steps in Torq. You'll need to enter some information from OneLogin in the corresponding SSO fields in Torq.

The information is available in the SSO tab of the new app.

OneLogin app SSO information
onelogin-saml-certificate

Assign the Application to Users and Groups

In the Users tab, define which organizational users and groups should have access to Torq.

Screenshot of adding users to groups in OneLogin.

Define SSO Claims Mapping

The Claims Mapping determines which Torq role is assigned to each user based on identity provider attributes.

  1. Add Claim Mapping Rules: In the Claims Mapping section, click Add Claim to create a new rule.

    • The wizard automatically offers the first mapping, email, marked as recommended.

    • This field is auto-filled with the email address of the current user (the Owner performing the setup).

    • You can optionally edit this initial mapping before saving.

    • After editing, click Add to move the mapping into the saved section.

  2. Provide Mapping Details: For each rule, define the following:

    • Claim Name: The field from your IdP (for example, email or groups).

    • Claim Value: The expected value of the claim (case-sensitive).

    • Assigned Role: The Torq role to assign (for example, Admin, Editor, Viewer).

  3. Organize Claim Priority:

    • Mappings are evaluated top-down.

    • Place the claim with the highest privilege role at the top.

    • Lower-privilege mappings should follow in descending order.

    • A user’s role is determined by the first matching claim.

  4. Save Configuration: After defining all required mappings, click Save to complete the setup.

Important!
The first email claim mapping is essential to prevent account lockouts in Torq. Do not delete it until SSO has been tested and verified with other users, as any misconfiguration in Torq or your IdP could result in loss of access.

Did this answer your question?