Set up single sign-on (SSO) using SAML 2.0

Security Assertion Markup Language (SAML) 2.0 is a standard protocol to exchange authentication data between security domains. To set up an SSO connection for users to sign in to Blackbaud solutions through a SAML 2.0 identity provider (IdP), such as Google Workspace, OneLogin, Shibboleth, and Central Authentication Service (CAS), an organization admin (or another user with the necessary admin rights) must claim the organization's email domains, create a SAML 2.0 connection and configure its settings, test the connection, and then turn on SSO.

Tip: Don't want to manage certificates for your SSO connection? Leave SAML behind and set up your connection through OpenID Connect (OIDC) instead.

To prevent inadvertent lockouts, make sure to:

  • Complete the setup during a maintenance window for your organization's network.

  • Create a Blackbaud ID outside of your claimed domains with access to the Authentication settings page in Security.

Blackbaud doesn't support IdP-initiated connections. If you need to enable users to connect to Blackbaud solutions through an app in your IdP's portal, then after you turn on SSO, you must configure that app to use the redirect URL for your live connection.

Configure SSO

To set up your SSO connection using SAML 2.0, follow the steps in the following sections:

Tip: For a visual reference of the SAML 2.0 setup that uses Okta as the IdP, see SAML 2.0 setup.