SSO/SAML Configuration
Overview
This page describes how to configure SSO (Single Sign-On) and SAML (Security Assertion Markup Language) for Ganymede, depending on your SAML provider.
Okta
Follow these instructions in Okta’s documentation to create a new Okta SAML application.
The following fields should be used in your application:
Field | Notes |
---|---|
Single sign on URL | https://ganymede-core.firebaseapp.com/__/auth/handler |
Audience URI | ganymede.bio |
Hide this SAML application tile from users - there are instructions below that explain how to create an Okta tile of Ganymede.
Once complete, the following information from your Okta application should be provided to Ganymede:
Field | Notes |
---|---|
Public Certificate | Must start with "-----BEGIN CERTIFICATE-----", and end with "-----END CERTIFICATE-----". |
Identity Provider Issuer (Entity ID) | https://www.okta.com/{unique_key} |
Identity Provider Single Sign-On URL (SSO URL) | https://{org}.okta.com/app/{org}_ganymede_1/{unique_key}/sso/saml |
On the right-side panel of the Okta application window, there is a link to SAML setup. The fields above can be found in that window, and should be shared with Ganymede.
Create Bookmark App
There is a known issue between Okta and Firebase, where the Okta tile will not redirect properly to the Ganymede site. After the SAML application above is configured and working properly, create a new Okta bookmark application that links to your Ganymede tenant.
The png below can be used as the image for the Ganymede tile:

Google
Follow these instructions in Google's documentation to create a new Google SAML application.
The following fields should be used in your application:
Field | Notes |
---|---|
ACS URL | https://ganymede-core.firebaseapp.com/__/auth/handler |
Entity ID | ganymede.bio |
Once complete, the following information from your Google application should be provided to Ganymede:
- SSO URL
- Entity ID
- Certificate
Azure
Follow these instructions in Microsoft's documentation to create a new Azure SAML application.
The following fields should be used in your application:
Field | Notes |
---|---|
Identifier (Entity ID) | ganymede.bio |
Reply URL (Assertion consumer service URL) | https://ganymede-core.firebaseapp.com/__/auth/handler |
Sign on URL | {client}.ganymede.bio |
Once complete, the following information from your Azure AD SSO application should be provided to Ganymede:
- Certificate (Base64) - This can be found within the SAML Signing Certificate section
- Azure AD Identifier - This can be found within the Set up SSO Demo section
- Login URL - This can be found within the Set up SSO Demo section