Last updated: May 17, 2024
Single sign-on (SSO) allows you to give your team members one account for all of the systems your business uses. Security Assertion Markup Language, or SAML, is an open standard used for authentication. Based upon the Extensible Markup Language (XML) format, web applications use SAML to transfer authentication data between two parties - the identity provider (IdP) and the service provider (SP). If you have a HubSpot Enterprise account and have SAML-based SSO set up, you can require users to log in to HubSpot using their SSO credentials. Please note: this setup process should be done by an IT administrator with experience creating applications in your identity provider account. Only super admins can set up SSO for your account. The navigation instructions and field names above may differ across identity providers. You can find more specific instructions for setting up applications in commonly used identity providers below: If you're using Active Directory Federation Services, learn more about setting up single sign-on using AD FS. After setting up SSO, you can require all users to use SSO to log in to HubSpot. After setting up SSO, you can exclude specific users from the SSO requirement to allow them to also log in with their HubSpot user account. Please note: the user who selects the Require Single Sign-on checkbox will automatically be added to the excluded users. It is recommended to exclude at least one user with Super Admin permissions. In the event your identity provider is down, they can log in and clear the Require Single Sign-oncheckbox to allow all users to log in with their HubSpot accounts. Please note: you need administrative access in your Okta instance. This process is only accessible in the Classic UI in Okta. Once your SSO setup has been verified, navigate to https://app.hubspot.com/login/sso and enter your email address. HubSpot will look up your portal's single sign-on configuration and send you to your identity provider to sign in. You’ll also see a Log in with SSO button when visiting a direct link to your account. Please note: you need administrative access in your OneLogin instance to create a new SAML 2.0 application in OneLogin, as required. Log in to OneLogin. Navigate to Apps. Search for HubSpot. Click the app that states "SAML2.0". In the upper right, click Save. Click the Configuration tab. In the HubSpot Account ID field, add your Hub ID. Learn how to access your Hub ID. In the upper right of your OneLogin account, click Save. Once your SSO setup has been verified, navigate to https://app.hubspot.com/login/sso and enter your email address. HubSpot will look up your portal's single sign-on configuration and send you to your identity provider to sign in. You’ll also see a Log in with SSO button when visiting a direct link to your account. For Microsoft Entra ID (formerly Azure Active Directory) users, install the HubSpot app in the Microsoft Azure Marketplace and follow Microsoft's instructions to set up the integration. This will allow you to use Microsoft Entra ID to manage user access and turn on single sign-on with HubSpot. Once your SSO setup has been verified, navigate to https://app.hubspot.com/login/sso and enter your email address. HubSpot will look up your portal's single sign-on configuration and send you to your SSO provider to sign in. You’ll also see a Log in with SSO button when visiting a direct link to your account. Check out Google's instructionson how you can set up HubSpot single sign-on with G-Suite as your identity provider. Once your SSO setup has been verified, navigate tohttps://app.hubspot.com/login/ssoand enter your email address. HubSpot will look up your portal's single sign-on configuration and send you to your SSO provider to sign in. You’ll also see aLog in with SSO button when visiting a direct link to your account. Which binding does HubSpot use as a SAML service provider? HubSpot uses HTTP Post. I’m using Active Directory Federation Services. What should I use as my relying party trust (RPT)? Learn more about setting up single sign-on using ADFS. Which username format should I set in my SAML application? HubSpot users are identified by email address. Ensure that your IDP is sending a nameID in email format that corresponds with their HubSpot user’s email address. Which signing algorithm does HubSpot support? Please note: After March 31, 2023, HubSpot will stop supporting SHA-1 for new SSO connections. Any existing SSO connections that use SHA-1 may still work until HubSpot stops supporting SHA-1 for all SSO connections on June 30, 2023. If you are using SHA-1, you will need to migrate to SHA-256 by June 30, 2023. HubSpot supports only SHA-256 as signing algorithms. You need to sign your requests with SHA-256. Which format should I provide my x509 certificate in? HubSpot requires a PEM format x509 certificate. You should copy the text contents of the PEM file into the x509 certificate field in HubSpot. The value should also include the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE-----. Can I turn on two-factor authentication, required two-factor authentication, SSO, and required SSO at the same time? Yes. When you have two-factor authentication turned on, it's active on any login with your HubSpot username and password. Enabling 2FA in HubSpot does not prevent you from logging in using Google's 2FA or SSO. Therefore, if users are excluded from the SSO requirement, you can require HubSpot's 2FA to ensure that any logins that bypass SSO go through 2FA or Google. If you enable 2FA for your Google account, this is separate from your HubSpot setup. However, when you log into HubSpot with your Google account, Google's 2FA will protect your HubSpot account. If you have two-factor authentication and SSO required or enabled in your account at the same time, the following will occur:General setup
Require SSO for all users
Exclude specific users from SSO requirement
Instructions for specific identity providers
Okta
OneLogin
Microsoft Entra ID
Google
FAQs