1Kosmos integrates with Kapost as a SAML 2.0 identity provider, enabling content teams to access the Kapost platform using biometric authentication.
Integration type
Productivity
Overview
Kapost, now operating as Upland Kapost under Upland Software, is a content marketing platform used by marketing teams to plan, create, and distribute content. Kapost supports SAML 2.0-based single sign-on, allowing enterprise organizations to configure an external identity provider for centralized authentication.
What we solve
Marketing teams using Kapost need to secure access to content planning and publishing workflows with centralized SSO, reducing password reuse and account takeover risk for enterprise users. This integration enables SAML 2.0 SSO from Kapost to 1Kosmos so users authenticate biometrically and access Kapost without a Kapost password.
The SSO configuration for Kapost is managed through the Kapost account settings. Administrators enter the SAML identity provider details, including the SSO endpoint URL, entity ID, and signing certificate.
1Kosmos acts as the SAML identity provider, authenticating users biometrically and returning a signed SAML assertion to Kapost. The SP values for Kapost are generated by the Kapost platform and must be collected from the SSO settings screen before completing the AdminX configuration.
Prerequisites
Active 1Kosmos tenant: Administrator access to the AdminX portal. Contact 1kosmos.com/contact if not yet provisioned.
Kapost administrator access: Admin access to Kapost account settings, including SSO configuration. Contact Kapost/Upland support to confirm SSO is available on your account plan.
User accounts provisioned: Users must have Kapost accounts with email addresses matching their 1Kosmos directory records before SSO is enabled.
1Kosmos mobile app installed: Users must have the app on iOS or Android with biometrics enrolled before testing.
Configuration values
Values to collect from 1Kosmos AdminX (IdP) for Kapost:
Field | Where to find it |
|---|---|
SSO Login URL | AdminX → Settings → IdP Configuration → Single SignOn Service URL |
IdP Entity ID | AdminX → Settings → IdP Configuration → Core Configuration |
Signing Certificate (PEM) | AdminX → Settings → IdP Configuration → View Certificate → Public Key |
Values to collect from Kapost (SP) for AdminX:
Field | Where to find it |
|---|---|
ACS URL | Kapost account settings → SSO configuration screen |
SP Entity ID | Same SSO configuration screen |
Integration steps
Step 1: Locate SSO settings in Kapost
Log in to Kapost as an administrator and navigate to Account Settings → Single Sign-On (or the equivalent SSO configuration section for your Kapost version).
Note the SP Entity ID and ACS URL displayed. Contact Kapost support if these values are not visible, as some Kapost configurations require SSO to be enabled by the Kapost support team before the settings screen appears.
Step 2: Add Kapost as a SAML application in AdminX
Log in to the AdminX portal and navigate to Applications → Add Application.
Select SAML 2.0 Generic and click Add integration. Enter "Kapost" as the Application Name and your Kapost URL as the Application Access URL.
Set NameID Format to
urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddressand NameID Value to email. Add claims for email, first name, and last name. Enable Assertion signing.Enter the Kapost SP Entity ID and ACS URL. Click Save.
Step 3: Enter 1Kosmos IdP details in Kapost
Return to Kapost Account Settings → Single Sign-On.
Enter the 1Kosmos SSO Login URL as the Identity Provider SSO URL.
Enter the 1Kosmos IdP Entity ID as the Identity Provider Issuer or Entity ID.
Upload or paste the 1Kosmos signing certificate. Save the configuration.
Step 4: Test the integration
Navigate to your Kapost login URL and initiate SSO. Confirm you are redirected to 1Kosmos, authenticate biometrically, and are returned to Kapost as an authenticated user.
Attribute mappings
Source (1Kosmos) | Target (Kapost) | Description |
|---|---|---|
user.email | email / NameID | Primary identifier; must match the Kapost user account email |
user.firstName | first_name | User first name |
user.lastName | last_name | User last name |
Integration notes
Kapost SSO configuration details are not publicly documented in depth by Upland Software.
If the SSO settings screen is not accessible in your Kapost account, contact Upland Kapost support to confirm whether SAML SSO is available on your plan and to request that the feature be enabled.
Upland support can also provide the SP metadata values if they are not visible in the admin console.

