Documentation Index
Fetch the complete documentation index at: https://docs.gominerva.com/llms.txt
Use this file to discover all available pages before exploring further.
SAML single sign-on lets users authenticate through your identity provider before entering Minerva. SCIM provisioning lets your identity provider create, update, and deactivate Minerva tenant users.
Access: Requires the Admin role or above. In the sidebar,
go to Administration > Configuration, then
open Authentication under Access and authentication.
Use this guide when you need to:
- configure a SAML identity provider for Minerva
- choose whether users can sign in with passwords, SSO, or both
- configure SCIM user provisioning from an identity provider
- rotate SAML signing certificates or SCIM bearer tokens
- set up common identity providers such as Okta, Microsoft Entra ID, PingFederate or PingOne, Rippling, and OneLogin
SAML and SCIM solve different parts of identity management. SAML controls
sign-in. SCIM controls user lifecycle events such as user creation, profile
updates, and deactivation.
Keep at least one Admin able to sign in while you test SSO. Do not switch to
SSO only until the SAML test succeeds for an assigned admin
user.
Authentication Settings Page
The Authentication page contains four sections:
- Service provider: Minerva values that you copy into the
identity provider
- SAML identity provider: identity-provider metadata,
certificate status, save, and test controls
- SCIM provisioning: SCIM base URL, bearer token, default role,
role mappings, and provisioning controls
- Sign-in mode: password-only, password plus SSO, or SSO-only
access
Minerva Production Values
Use these Minerva production values when configuring your production identity
provider app.
Lower-environment test tenants may show different values. Always copy the
values shown in the Minerva Authentication page for the tenant you are
configuring.
Before You Begin
Confirm these items before changing authentication settings:
- you have Admin access in Minerva
- you have admin access in the identity provider
- the users who need Minerva access have email addresses that match their Minerva user emails
- you know which IdP group, role, or entitlement values should map to Minerva Admin, Developer, or Member roles
- you have a pilot user or group ready for testing
Start with Password + SSO during rollout. Move to
SSO only only after the IdP assignment, SAML test, and SCIM
pilot all work as expected.
SAML SSO Setup
SAML setup is a two-way exchange:
- Copy Minerva service-provider values into the identity provider.
- Copy identity-provider metadata or manual IdP values back into Minerva.
- Save the SAML provider in Minerva.
- Test SSO from Minerva with an assigned admin user.
- Choose the tenant sign-in mode.
Minerva Values To Copy Into The IdP
- Entity ID identifies Minerva as the SAML service provider.
- ACS URL is where the IdP sends the signed SAML response.
- Keep these values unchanged after go-live unless Minerva support directs a
rotation.
IdP Values To Save In Minerva
- IdP entity ID, sometimes called issuer
- SSO URL, sometimes called login URL or SAML endpoint
- One or more X.509 signing certificates from IdP metadata or
certificate export
Recommended SAML Setup Sequence
- Open Administration > Configuration >
Authentication in Minerva.
- Copy the Entity ID and ACS URL from the Service provider section.
- Create a SAML application in the identity provider and paste those Minerva
values into the service-provider fields.
- Set the SAML subject or NameID to the email address users will use in
Minerva.
- Download IdP metadata, or copy the IdP entity ID, SSO URL, and signing
certificate.
- Paste the metadata into Minerva and parse it, or enter the IdP values
manually.
- Save the SAML provider, assign a test admin user in the IdP, and run
Test SSO in Minerva.
- After a successful test, choose Password + SSO for rollout
or SSO only when password sign-in should be blocked.
SAML Field Labels You May See
Different IdPs use different labels for the same SAML values.
| Minerva field | Common IdP labels |
|---|
| Entity ID | Audience URI, SP Entity ID, Identifier, Application Entity ID, Relying Party ID |
| ACS URL | Assertion Consumer Service URL, Reply URL, Recipient URL, SSO callback, ACS URL |
| Provider name | Customer-facing app name, provider display name, app name |
| IdP entity ID | Issuer, Identity Provider Entity ID, federation metadata entity ID |
| SSO URL | Login URL, SAML 2.0 endpoint, Single Sign-On Service URL, IdP SSO URL |
| X.509 certificate | Signing certificate, SAML certificate, public certificate, certificate in metadata |
Sign-In Modes
| Mode | What users can do | When to use it |
|---|
| Password only | Users sign in with Minerva email and password. | Before SAML is configured, or if SSO is not required. |
| Password + SSO | Users can choose password sign-in or SSO. | During rollout, pilot testing, and fallback periods. |
| SSO only | Users must sign in through the identity provider. | After SAML has been saved, tested, and assigned to the right users. |
Certificate Security And Rotation
Saved IdP signing certificate contents are hidden after upload. Minerva shows certificate metadata such as expiration date and SHA-256 fingerprint so admins can confirm the active certificate without exposing raw certificate material.
When rotating a certificate:
- Add or rotate the signing certificate in the identity provider.
- Export fresh IdP metadata, or copy the replacement PEM certificate.
- Paste the fresh metadata or replacement certificate into Minerva.
- Save the SAML provider.
- Run Test SSO before the old certificate expires.
A certificate mismatch can prevent SSO sign-in. Complete certificate rotation
before the old certificate expires, and keep password fallback available until
the test succeeds.
SCIM Provisioning Setup
SCIM provisioning uses a Minerva SCIM base URL and bearer token. Generate the token in Minerva, store it in the identity provider, and test the connection before enabling broad provisioning.
SCIM does not replace SSO. SAML controls sign-in; SCIM controls the user lifecycle.
Configure and test both before moving a tenant to SSO only.
Recommended SCIM Setup Sequence
- Open Administration > Configuration >
Authentication in Minerva.
- Copy the SCIM base URL from the SCIM provisioning section.
- Generate a bearer token and store it in the IdP immediately. The full token is
shown only once.
- Create or open the SCIM provisioning connection in the IdP.
- Paste the SCIM base URL and bearer token into the IdP, then test the
connection.
- Assign a small pilot group and confirm users are created or updated in
Minerva.
- Configure role mappings when IdP groups, roles, or entitlements should control
Minerva Admin, Developer, or Member access.
- Enable SCIM provisioning in Minerva after the IdP connection and pilot
assignment are working.
SCIM Field Labels You May See
| Minerva field | Common IdP labels |
|---|
| SCIM base URL | Tenant URL, Base URL, SCIM endpoint, SCIM connector URL |
| Bearer token | Secret token, API token, OAuth bearer token, authorization token |
| Default role | Fallback role for users who do not match a role mapping rule |
| Role mapping rules | Group Push values, app role values, entitlement values, group names |
| Disable dashboard-managed invitations | Use when the IdP should manage user creation and deactivation |
Provisioning Behavior To Review
The IdP should manage:
- users created through app assignment
- name, email, active status, and mapped role updates
- deactivation or suspension when users are removed from scope
Before broad rollout, confirm:
- whether SCIM should disable dashboard-managed invitations
- whether unmatched users should default to Member or a more restrictive role
- whether group names or app roles are stable enough to use as Minerva role
mapping values
Role Mapping
Minerva supports these tenant roles for provisioned users:
| Minerva role | Use for |
|---|
| Admin | Users who manage tenant settings, identity configuration, teams, and operational controls. |
| Developer | Users who manage API keys, webhooks, and integration delivery tasks without full tenant administration. |
| Member | Standard users who use Minerva workflows but do not administer tenant configuration. |
Role mapping rules compare the group, role, or entitlement value sent by the IdP with the values configured in Minerva. Keep those values stable and easy to understand, such as Minerva Admins or Minerva Developers.
If no role mapping matches a provisioned user, Minerva applies the configured default role.
IdP Quick Guides
The same Minerva values work across major identity providers, but each IdP uses different labels and connector templates. Use the quick guide below with your IdP administrator.
Configure SAML first, then SCIM. Keep at least one Admin able to sign in before
changing the tenant to SSO only.
Okta
For SAML:
- Create or open the Minerva SAML app integration in Applications.
- Set Single sign-on URL and Recipient URL to the Minerva ACS URL.
- Set Audience URI / SP Entity ID to the Minerva Entity ID.
- Use the user email address as the Name ID and assign a test admin user.
- Copy the Identity Provider metadata into Minerva or download the certificate
and enter the IdP issuer and SSO URL manually.
For SCIM:
- Enable SCIM provisioning for the same app integration when available.
- Set the SCIM connector base URL to the Minerva SCIM base URL.
- Use HTTP Header or bearer-token authentication and paste the Minerva bearer
token.
- Enable create, update, and deactivate user actions.
- Use Group Push or profile attributes when you want Okta values to drive
Minerva role mappings.
Notes:
- If the Provisioning tab is not available, your Okta org or app template may
need SCIM enabled by Okta.
- Test with a small assigned group before moving the app to SSO only.
Microsoft Entra ID
For SAML:
- Create or open an Enterprise Application, then choose Single sign-on >
SAML.
- Set Identifier (Entity ID) to the Minerva Entity ID.
- Set Reply URL (Assertion Consumer Service URL) to the Minerva ACS URL.
- Use user.mail or user.userprincipalname as the user identifier, depending on
the email users use in Minerva.
- Copy the App Federation Metadata URL or download the SAML certificate and
enter the issuer, login URL, and certificate in Minerva.
For SCIM:
- Open Provisioning for the Enterprise Application and choose automatic
provisioning.
- Set Tenant URL to the Minerva SCIM base URL.
- Set Secret Token to the Minerva bearer token and test the connection.
- Scope provisioning to assigned users and groups unless your rollout plan says
otherwise.
- Map Entra groups or app roles to the values configured in Minerva role mapping
rules.
Notes:
- Entra provisioning runs on a cycle, so successful changes may not appear
instantly.
- Keep the same Enterprise Application for SAML and provisioning when your tenant
policy allows it.
PingFederate or PingOne
For SAML:
- Create a SAML application or SP connection for Minerva.
- Set the partner or relying-party entity ID to the Minerva Entity ID.
- Set the ACS endpoint to the Minerva ACS URL and use an email NameID format.
- Export the IdP metadata or record the issuer, SSO endpoint, and active signing
certificate.
- Upload metadata in Minerva or enter the IdP values manually, then save and
test.
For SCIM:
- Create an outbound SCIM connection for Minerva when your Ping deployment
includes provisioning.
- Set the SCIM endpoint/base URL to the Minerva SCIM base URL.
- Use bearer-token authentication with the Minerva SCIM token.
- Map user email, given name, family name, and active status.
- Send group, role, or entitlement values when you want Minerva role mappings to
apply.
Notes:
- PingFederate deployments vary by adapter and provisioning connector. Use your
IdP administrator to confirm the available SCIM connector.
- Export fresh metadata after signing-certificate rotation and update Minerva
before the old certificate expires.
Rippling
For SAML:
- Create a custom SAML or SAML and SCIM app for Minerva in Rippling.
- Set the ACS or Reply URL to the Minerva ACS URL.
- Set the SP Entity ID or Audience to the Minerva Entity ID.
- Use employee email as the SAML subject and assign a pilot group.
- Copy Rippling IdP metadata into Minerva or enter the SSO URL, issuer, and
signing certificate manually.
For SCIM:
- Enable provisioning on the custom app when your Rippling plan supports SCIM.
- Set the SCIM URL to the Minerva SCIM base URL.
- Use the generated Minerva bearer token as the SCIM authentication token.
- Choose the Rippling employee attributes or groups that should control app
assignment.
- Send group or role values that match the Minerva role mapping rules.
Notes:
- Rippling is often driven by employee lifecycle rules. Confirm who should be
assigned before enabling broad provisioning.
- If SCIM is not available in your Rippling app setup, keep user creation in
Minerva until your IdP administrator enables it.
OneLogin
For SAML:
- Use a SAML custom connector or a SCIM Provisioner with SAML connector for
Minerva.
- Set ACS URL to the Minerva ACS URL.
- Set Audience or Entity ID to the Minerva Entity ID.
- Use email as the NameID value and assign the app to a test user or role.
- Copy the OneLogin issuer, SSO URL, and signing certificate into Minerva.
For SCIM:
- Use a SCIM v2 connector when you want lifecycle provisioning.
- Set SCIM Base URL to the Minerva SCIM base URL.
- Set the authorization header or bearer token value to the Minerva token.
- Enable user create, update, and deactivate actions.
- Map role or group values to the same text configured in Minerva role mapping
rules.
Notes:
- OneLogin has several SAML and SCIM connector templates. Select the one that
supports both SAML sign-in and SCIM provisioning when you want one app.
- Keep SCIM role values simple and stable, because Minerva matches the configured
text values exactly after trimming whitespace.
Rollout Checklist
Use this checklist before changing production sign-in behavior:
- SAML app is assigned to a pilot admin user or pilot group in the IdP
- Entity ID and ACS URL in the IdP match the values shown in Minerva
- IdP issuer, SSO URL, and signing certificate are saved in Minerva
- Test SSO succeeds in Minerva
- SCIM base URL and bearer token are saved in the IdP
- SCIM connection test succeeds in the IdP
- pilot users are created or updated correctly by SCIM
- role mapping values match the values sent by the IdP
- a rollback path is available before switching to SSO only
Common Issues
| Issue | What to check |
|---|
| SAML test fails before redirect | The SSO URL, IdP entity ID, or provider assignment may be incorrect. |
| SAML response is rejected | The ACS URL, Entity ID, recipient/audience, NameID, or signing certificate may not match. |
| User signs in but is not expected | Confirm the user is assigned to the Minerva app in the IdP and has the right email address. |
| SCIM connection test fails | Confirm the SCIM base URL, bearer token, and bearer-token authentication mode. |
| SCIM users receive the wrong role | Confirm the IdP is sending the expected group, role, or entitlement value and that it exactly matches a Minerva role mapping rule. |
| Users are still invited manually | If the IdP should own lifecycle management, enable SCIM provisioning and consider disabling dashboard-managed invitations while SCIM is enabled. |
If an IdP label does not match this guide exactly, look for the equivalent
SAML or SCIM concept. For example, Reply URL,
ACS URL, and Assertion Consumer Service URL
often refer to the same SAML endpoint.