Skip to main content

ManageEngine Access Manager Plus SAML integration

Multi-factor authentication (MFA) is an extra layer of security used when logging into websites or apps to authenticate users through more than one required security and validation procedure that only you know or have access to.

Security Assertion Markup Language (SAML) is a protocol for authenticating to web applications. SAML allows federated apps and organizations to communicate and trust one another’s users.

Acceptto™, as a SAML provider, improves the user login experience for Access Manager Plus users with convenient MFA, and offers a simple SAML solution for adding MFA and single sign-on (SSO) on the Access Manager Plus portal.


  • Acceptto account with a configured Identity Provider and LDAP Agent.

    For more information, see the LDAP Agent deployment guide.

  • Access Manager Plus user account with administrative access

  • User account with administrative privileges for the Acceptto eGuardian dashboard.

Access Manager Plus configuration

In this section, you'll configure ManageEngine Access Manager Plus as a service provider.

  1. Download the SAML metadata and certificate for your organization from Acceptto.

    Metadata download:<myorganization>/saml/download/metadata

    View metadata:<myorganization>/saml/metadata

    Certificate download:<myorganization>/saml/download/cert

  2. Log in to your Access Manager Plus admin portal as an administrator.

    Access Manager Plus admin portal
  3. Go to Admin > Authentication and click SAML Single Sign On.

    Add SSO
  4. In the Service Provider Details section, you'll need to copy these values for the SAML Service Provider Configuration in Acceptto.

    Service Provider details
  5. In the Configure Identity Provider Details section, enter the IdP details from the Acceptto metadata file downloaded in Step 1.

    Add metadata
  6. In the Import IdP's Certificate section, upload the Acceptto Certificate downloaded in Step 1.

    Import Acceptto Certificate
  7. In the Enable / Disable SAML Single Sign On section, enable single sign on for Access Manager Plus.

    Enable SSO

Acceptto SAML configuration as an Identity Provider (IdP)

In this section, you'll add an application for Access Manager Plus and set the SAML configuration settings. This will be the Identity Provider (IdP) side of the configuration.

  1. Log in to the Acceptto Dashboard with an administrative account and go to Applications.

  2. Click Create New Application.

    Create new application
  3. In the New Application form, on the General tab, set the following configurations:

    • Name – Set the name of the application. This is the name to display for push notifications, in the Admin panel, Application portal, and audit logs.

      For example, Access Manager Plus.

    • Type – Set to SAML Service Provider.

    • Out of Band Methods – Select the allowed methods end users can choose to approve MFA requests.

      For example, It'sMe app (push notifications), SMS, or Security Key.

    • Message for MFA Requests – (Optional) Type a message displayed to end users when sending an MFA request via push notification, SMS, or email.

    Add Access Manager Plus application
  4. Select the SAML Service Provider Configuration tab, and set the following configurations:

    • Issuer or Entity ID – Enter the Issuer/EntityID provided in Access Manager Plus.

    • Sign in URL – This login URL is the same as your Access Manager URL.

    • NameID Format – Set to Email Address.

    • Name Identifier – Set to Email.

    • ACS URL – Enter the ACS URL provided in Access Manager Plus.

    SAML configuration
  5. Click Save.

Test your application integration

  1. Go to your Access Manager Plus portal.

  2. You will be redirected to the Acceptto SSO page.

    SSO login
  3. After successful authentication, select your preferred MFA method to approve access to the Access Manager Plus application.

    Select MFA method
  4. Using an easy and passwordless authentication method, it redirects you to the Access Manager Plus portal page.


If you have questions or need assistance, contact SecureAuth Support.


Want to learn more about our MFA solutions? Contact our Professional Services for a demo today.


All product names, trademarks, and registered trademarks are the property of their respective owners.

All company, product, and service names used in this document are for identification purposes only. The use of these names, trademarks, and brands do not constitute an endorsement by the SecureAuth Corporation.