Skip to main content

ConnectWise Control SAML integration

Multi-factor authentication (MFA) is an extra layer of security used when logging into websites or apps to authenticate users through more than one required security and validation procedure that only they know or have access to. Security Assertion Markup Language (SAML) is a protocol for authenticating for web applications. SAML allows federated apps and organizations to communicate and trust one another’s users.

Acceptto™, as a SAML provider, improves the user login experience for ConnectWise Control users with its Intelligent SSO-MFA solution.


  • An Acceptto account with a configured Identity Provider and LDAP Agent.

    For more information, see the LDAP Agent deployment guide.

  • A user with administrative privileges for ConnectWise Control.

Configure ConnectWise Control as a Service Provider (SP)

  1. Download the SAML metadata for your organization from Acceptto at<myorganization>/saml/download/metadata.

  2. Before you begin, ensure that you have an Administrative user in a location that is not subject to the Acceptto MFA. This user will allow you to login back to your instance if there are any issues with the configuration.

  3. Log into your ConnectWise Control instance and go to Admin > Security. In the User Sources, click on Add User Source.

  4. Select SAML.

  5. In the SAML section, click on three dots. Select Enable.

  6. Click again on the three dots, and then click on Generate Metadata. Keep the Metadata for the next section.

  7. Click on the three dots and select Configure.

  8. Fill the blank part with below information :

    IDP Metadata URL: Enter the Acceptto Metadata URL you obtained earlier. UserNameAttributeKey: NameID . UserDisplayNameAttributeKey: displayname. EmailAttributeKey: mail. Display Name: Acceptto.

  9. Click on Save Configuration.

Acceptto SAML Configuration as Identity Provider (IdP)

  1. Login to the Acceptto Dashboard with an administrative account and go to Applications.

  2. Create a new application by selecting Create New Application.

  3. In the New Application form, enter the following values under the General tab.

    • Name - The application name displayed in the admin panel and application portal and used for push notifications and audit logs (e.g. connectwise-control)

    • Type - Select "SAML Service Provider" from the options

    • Out of Band Methods - Select the allowed methods for approving MFA requests

    • Message for MFA Requests - Enter the user-facing message for Push, SMS, and email MFA requests (optional)

  4. Under the SAML Service Provider Configuration tab, enter the following values:

    • Issuer or Entity ID – The Issuer/EntityID of your ConnectWise Control instance, which is in the Metadata file you downloaded in the previous section.

    • Sign in URL - The link used by your users to access the ConnectWise Control. (e.g

    • Metadata URL - The URL containing metadata about your ConnectWise Control instance, which you downloaded in the previous section. (e.g:{release}/auth/{companyId}/metadata)

    • ACS URL - The ACS URL of your ConnectWise Control instance, which is in the Metadata file.

  5. Click Save.

Test your application integration

  1. Open your ConnectWise Control URL in a browser and click on Connect with Acceptto.

  2. You will be redirected to the Acceptto SAML page.

    SSO login
  3. After successful authentication, you’ll see Acceptto’s MFA options. Select your desired method of authentication.

    Select MFA method
  4. After approving the authentication request, the user will be redirected to the ConnectWise Control console.



If you have questions or need assistance, contact SecureAuth Support.


Want to learn more about our MFA solutions? Contact our Professional Services for a demo today.


All product names, trademarks, and registered trademarks are the property of their respective owners.

All company, product, and service names used in this document are for identification purposes only. The use of these names, trademarks, and brands do not constitute an endorsement by the SecureAuth Corporation.