For AI agents: a documentation index is available at the root level at /llms.txt and /llms-full.txt. Append /llms.txt to any URL for a page-level index, or .md for the markdown version of any page.
Logo
DeveloperAcademyCommunityStatus
  • Service Management
    • Overview
    • Concierge & Ticketing Capabilities Overview
    • Forms
    • Forms - Integration Specific Guides
    • Live Agent Chat / Handoff
    • Triage
    • Approval Mirroring
    • Ticket Interception
    • Generic Ticketing Integration: Ticket Gateway
  • Administration
    • MyMoveworks
    • Organization Information
    • Roles and Permissions
    • MyMoveworks SSO
      • Okta SSO Setup
      • Microsoft Entra Setup
      • OneLogin Setup (OIDC)
      • Google SSO Setup (SAML)
      • OIDC Setup (General)
      • SAML Setup (General)
      • SSO Troubleshooting
  • Moveworks Setup
    • Accessing Moveworks Setup
    • First-Time Login via Magic Link
    • Moveworks Setup Modules
    • Moveworks Setup: Module How To Guides
    • Plugin Management
    • Monitor Alerts
    • Audit Logs
    • DSL Fields Defaults
    • Data Crawling View
    • API Playground
    • Setup Homepage
    • Troubleshooting Hub
    • Security and Privacy Settings
    • Configuration Delete
    • Advanced Config Editor
    • Identity configuration
    • Onboarding Stage
  • Security
    • Security
    • Hyperlink & Button Expiry
    • Attachment Handling
    • Moveworks Subprocessors
  • Provision Management
    • Overview
    • Access Software
    • Access Groups
    • Access Account
  • Access Requirements
    • Overview
    • Update Set Modules
    • Ticketing Systems & ITSMs Access
    • Identity and Access Management Systems Access
    • Multi-Factor Authentication (MFA) Systems Access
    • Knowledge Access Requirements
    • Email Distribution List Systems Access
    • Facilities Management Access
    • Live Agent Chat Access
    • HR Information System Access
    • Expense Management Access
    • Calendar Management Access
  • Core Platform
    • User Identity
    • Moveworks On-Prem Agent
    • Approvals Engine
    • Entity Catalog
    • Configuration Languages
    • Moveworks Data Objects
    • SIEM
  • Employee Experience Insights
    • Overview
    • Breaking Down the Dashboard
    • Understanding Industry Benchmarks
    • Apps & Services
    • Impact Module
    • EXI Common Use Cases
    • Configure EXI
    • Ticket Backpolling
  • Knowledge Studio
    • Overview
    • Knowledge Studio Configuration
    • AI Powered Recommendations
    • Inspecting & Verifying Sources
    • Publishing Articles
    • Creating Knowledge Articles
    • Resolving IT Tickets Guidance
DeveloperAcademyCommunityStatus
On this page
  • Prerequisites
  • Configuration Steps
  • Create SAML Application
  • Add SAML Configuration in MyMoveworks
AdministrationMyMoveworks SSO

SAML Setup (General)

||View as Markdown|
Was this page helpful?
Edit this page
Previous

SSO Troubleshooting

Next
Built with

Prerequisites

Making edits?

Before you edit your SSO configuration, make sure you are logged into MyMoveworks. Otherwise, you will not be able to log in and update your SSO configuration details.

SSO Prerequisites

  • Have sufficient privileges to create & configure a SAML application.

Moveworks SSO Prerequisites

  • Your Moveworks Environment should be initialized in order to continue. (Verify with your Account Team if this has been completed)
  • Note the following values.
    • data_center_domain - the data center where your organization is hosted (see table below).
      Data Centerdata_center_domain
      United States (default)moveworks.com
      Canadaam-ca-central.moveworks.com
      EUam-eu-central.moveworks.com
      Australia / Asia Pacificam-ap-southeast.moveworks.com
      Government Secure Cloudmoveworksgov.com
    • subdomain - your organization’s login subdomain. This should match your customer_id, which can beverified from the General Information Page.

      🚧 Warning

      Make sure to use the unique subdomain. For example, if you’re organization’s login subdomain is acme.moveworks.com, then your subdomain is acme and your data_center_domain is moveworks.com which is part of the US Data center.

    • customer_id - The unique identifier for your organization . This is stored as Org Name under Organization Details > General Information

      ❗️ The Org name cannot be changed. Once set, the same value should be used in all cases.

      In exceptional cases where you would like Moveworks to support your organisation with a different subdomain value. Please reach out to Moveworks Support.

Configuration Steps

Create SAML Application

Go to your SSO Admin Portal & create a new “Security Assertion Markup Language” (SAML) application. Please configure your urls based on your Moveworks SSO properties.

  1. App Name: Moveworks.

  2. Sign-in Method: SAML 2.0 as the sign in method.

  3. SAML ACS URL: https://{{subdomain}}.{{data_center_domain}}/login/sso/saml

    📘 Multiple URLs?

    Moveworks uses the same url for sending and receiving SAML Assertions. So you can use this SAML ACS URL for the following URLs

    • Single-sign on URL
    • Destination URL
    • Recipient URL.
  4. Audience URI (also called SP Entity ID): https://www.moveworks.com.

  5. Relay State: customer_id

  6. Application Icon:

    image

Add SAML Configuration in MyMoveworks

  1. Note your SAML Configuration variables from your SSO platform
    • Identity Provider SSO URLidp_url
    • Identity Provider Issuer: idp_issuer
    • X.509 Certification: x509_certificate To actually set the config most SSO tools will have an XML output. Using this you should be able to get everything you need.

    Follow this screenshot — your main tasks: entityID
    1. Use the Identity Provider (IdP) Sign-On URL as the entityID.
    2. You can capture it during the redirect to your SSO service and validate that it matches the URL x509 Certificate
    3. Format the certificate per standard: include the header -----BEGIN CERTIFICATE-----, the footer -----END CERTIFICATE-----, and wrap lines at 64 characters each (except the final line). For example, you can use the tool at SAMLTool.com: Format X.509 Cert
    4. We recommend using VS Code (or similar) to format and then save the certificate as a .cert or .pem file. IdP Issuer Use the same URL you assigned for the Audience URL (in this case: https://www.moveworks.com) as the IdP issuer. Email Address Consistency Ensure that the email address sent in the SSO assertion from the IdP matches the email address that the user is ingested under in the system
  2. Navigate to SSO Settings in MyMoveworks
  3. If you already see a studio config, edit it. Otherwise, choose Create.
  4. Add your configuration using the values you’ve noted above
    • Moveworks Product: studio
    • Select Connector: moveworks or {{your_idp}}
    • Authentication Protocol: SAML
    • IDP Sign On / SSO URL: {{idp_url}} (From Step 1)
    • IDP Issuer: {{idp_url}}(From Step 1)
    • IDP Public Certificate: x509_certificate (From Step 1)
  5. Click Submit.
  6. Wait a few minutes, then attempt to log into your instance at https://{{subdomain}}.{{data_center_domain}}