Skip to main content

Sumo Logic SAML integration

Multi-factor authentication (MFA) is an extra layer of security used when logging into websites or apps to authenticate users through more than one required security and validation procedure that only they know or have access to. Security Assertion Markup Language (SAML) is a protocol for authenticating to web applications. SAML allows federated apps and organizations to communicate and trust one another’s users.

Acceptto™, as a SAML provider, improves the user login experience for Sumo Logic users with convenient MFA, and offers a simple SAML solution for adding MFA and single sign-on (SSO) on the Sumo Logic portal.


  • An Acceptto account with a configured Identity Provider and LDAP Agent.

    For more information, see the LDAP Agent deployment guide.

  • A Sumo Logic user account with administrative access to its dashboard.

  • A user with administrative privileges for the Acceptto Cloud dashboard.

Configure Sumo Logic as a Service Provider

  1. Download the SAML metadata and certificate for your organization from Acceptto.

    Metadata Download at<myorganization>/saml/download/metadata or view at<myorganization>/saml/metadata

    Certificate Download at<myorganization>/saml/download/cert

  2. Login to your Sumo Logic admin portal as an administrator. Navigate to the Administration > Security and click on SAML. Click on Add Configuration.

  3. In the Configuration Name, type a name of your choice and copy and paste the SAML URL of Acceptto from the metadata file in the Issuer part. Copy and paste the Acceptto Certificate file in the X.509 Certificate part.

  4. Select Use SAML Subject in Attribute Mapping section and check the SP Initiated Login Configuration box in the next part. Then, type a name in the Login Path section and paste the Acceptto login URL from the metadata in the Authn Request URL field.

  5. Select Post from the Select Binding Type, and check the Logout Page box. Paste the Acceptto Logout URL from the metadata in the Logout URL. Then, click on Save.

  6. Click on the SAML tab. You’ll see the information you need for the next section.


Acceptto SAML Configuration as Identity Provider (IdP)

  1. Login to the Acceptto Dashboard with an administrative account and go to Applications.

  2. Create a new application by selecting the Create New Application.

    Create new application
  3. In the New Application form, enter the following values under the General tab.

    • Name - The application name displayed in the admin panel, application portal and used for push notifications and audit logs (e.g. Sumo Logic).

    • Type - Select "SAML Service Provider" from the options.

    • Out of Band Methods - Select the allowed methods for approving MFA requests

    • Message for MFA Requests - Enter the user-facing message for Push, SMS, and email MFA requests (optional)

  4. Under the SAML Service Provider Configuration tab, enter the following values:

    • Issuer or Entity ID – Copy and paste the Entity ID URL of Sumo Logic in the Issuer/EntityID .

    • Sign in URL - Copy and paste the Authenticator Request URL of Sumo Logic.

    • NameID Format - Email Address.

    • Name Identifier - Email.

    • ACS URL - Copy and paste the Assertion Consumer URL of Sumo Logic.

  5. Click Save.

Test your application integration

  1. Go to your Sumo Logic login portal and click on Acceptto.

  2. You will be redirected to the Acceptto SSO page.

    SSO login
  3. After successful authentication, you’ll see the Acceptto MFA options. Select your desired method.

    Select MFA method
  4. Finally, you’ll be redirected to the Sumo Logic landing page.



If you have questions or need assistance, contact SecureAuth Support.


Want to learn more about our MFA solutions? Contact our Professional Services for a demo today.


All product names, trademarks, and registered trademarks are the property of their respective owners.

All company, product, and service names used in this document are for identification purposes only. The use of these names, trademarks, and brands do not constitute an endorsement by the SecureAuth Corporation.