Collect Planasonix SAML endpoints
From Settings → Security → SSO in Planasonix, copy:- ACS URL (Assertion Consumer Service / callback URL for SAML responses)
- Entity ID (audience / SP entity identifier)
Configure the Auth0 application
Create or select an application
In Auth0 Dashboard, go to Applications → Applications. Create a Regular Web Application (or use an existing app dedicated to Planasonix). Disable unused tabs (for example, OIDC-only settings) if you use SAML exclusively for this integration.
Enable the SAML2 addon
Open the application → Addons → enable SAML2 Web App. In the SAML configuration JSON or form, set:
- Callback URL: the Planasonix ACS URL exactly as displayed.
- Audience: the Planasonix Entity ID exactly as displayed.
Configure SAML bindings and signatures
Use HTTP-POST for the SAML response to the ACS URL unless Planasonix documentation specifies otherwise. Enable signing of assertions as required by your security policy. Download Identity Provider Metadata from Auth0 when Planasonix requests a metadata XML file.
Callback URL
The Callback URL in the SAML addon must match the Planasonix ACS URL with no extra path segments or query strings unless Planasonix provides them. Auth0 rejects SAML responses to unregistered callback URLs in many tenants.If you use custom domains in Auth0, confirm the SSO URL and issuer in the metadata reflect the domain users hit during login. Planasonix must receive metadata that matches the live issuer string.
Rules for attribute mapping
Use Auth0 Actions (recommended) or Rules (legacy) to shapeuser attributes before SAML assertion generation.
- Email and name
- Groups and roles
Map:
emailfrom the primary identity (event.user.emailin Actions)given_name/family_nameor custom claims for first and last name
email, firstName, lastName).Connection and social logins
If users reach Planasonix through an Auth0 Database, Enterprise, or Social connection, the SAML assertion still originates from Auth0. Ensure email verified requirements and linking behavior match your org’s account strategy so the same person does not get duplicate Planasonix users.Finish in Planasonix
Upload Auth0’s IdP metadata or paste SSO URL, issuer, and signing certificate into Planasonix. Test login, then coordinate Require SSO with your change management process.Related topics
SSO overview
Certificate rotation and org-wide SSO enforcement.
Generic OIDC setup
If your tenant uses OpenID Connect instead of SAML.