Slack

1Kosmos integrates with Slack as a SAML 2.0 identity provider, replacing password-based workspace login with biometric authentication on Business+ and Enterprise Grid plans.

Integration type

SSO

Updated

Overview

1Kosmos integrates with Slack as a SAML 2.0 identity provider, enabling workspace members to authenticate biometrically through the 1Kosmos mobile app when signing in to Slack. SAML SSO in Slack is available on Business+, Pro (optional), and Enterprise Grid plans. For Enterprise Grid, SSO is the default authentication method.

Slack's SAML SSO is configured in the workspace or organization settings under Authentication → SAML. The configuration requires the 1Kosmos SSO endpoint URL, IdP Entity ID, and X.509 certificate. Slack's fixed SP values are Entity ID https://slack.com and ACS URL https://[domain].slack.com/sso/saml. Slack uses HTTP POST binding and requires the SAML response to be signed.

Slack also supports Test Mode, which allows both SSO and password-based login simultaneously during the configuration and testing period. Test Mode should be used until SSO is fully validated before switching to a required SSO configuration.


Prerequisites

  • Active 1Kosmos tenant: Administrator access to the AdminX portal. Contact 1kosmos.com/contact if not yet provisioned.

  • Slack Business+ or Enterprise Grid plan: Workspace Owner or Organization Owner access to configure SAML SSO. SAML is not available on the Free plan.

  • Matching user email addresses: All Slack workspace members must have email addresses in Slack that match their 1Kosmos directory records. Slack uses email to identify users during SAML authentication.

  • 1Kosmos mobile app installed: Users must have the app on iOS or Android with biometrics enrolled before testing.


Configuration values

Values to collect from 1Kosmos AdminX (IdP) for Slack:

Field

Where to find it

SAML 2.0 Endpoint URL (SSO Login URL)

AdminX → Settings → IdP Configuration → Single SignOn Service URL

Identity Provider Issuer (IdP Entity ID)

AdminX → Settings → IdP Configuration → Core Configuration

Public Certificate (X.509)

AdminX → Settings → IdP Configuration → View Certificate → Public Key

Fixed Slack SP values to enter in AdminX:

Field

Value

SP Entity ID

https://slack.com (or https://[domain].slack.com for multiple Slack instances)

ACS URL

https://[domain].slack.com/sso/saml

NameID Format

urn:oasis:names:tc:SAML:2.0:nameid-format:persistent (recommended)

Integration steps

Step 1: Add Slack as a SAML application in AdminX

  • Log in to the AdminX portal and navigate to Applications → Add Application.

  • Select SAML 2.0 Generic and click Add integration. Enter "Slack" as the Application Name and https://[domain].slack.com as the Application Access URL.

  • Set NameID Format to urn:oasis:names:tc:SAML:2.0:nameid-format:persistent and NameID Value to a persistent unique user identifier. Add claims for email. Enable Assertion signing (Slack requires the response or assertion to be signed).

  • Enter https://slack.com as the SP Entity ID and https://[domain].slack.com/sso/saml as the ACS URL. Click Save.

Step 2: Configure SAML SSO in Slack workspace settings

  • Log in to Slack as a Workspace Owner. Click on your workspace name in the top left, then go to Settings and administration → Workspace settings.

  • Select the Authentication tab and click Configure next to SAML authentication.

  • In the top right, toggle Test mode on (keep SSO optional during testing).

  • In the SAML SSO URL field, paste the 1Kosmos SSO Login URL.

  • In the Identity Provider Issuer field, paste the 1Kosmos IdP Entity ID.

  • In the Public Certificate field, paste the full contents of the 1Kosmos X.509 certificate including the BEGIN and END CERTIFICATE lines.

  • Click Test Configuration to validate the setup, then click Turn on SSO or Save.

Step 3: Test the integration

  • Open a browser and navigate to https://[domain].slack.com. Click Sign in with SSO.

  • Enter your email address. Slack detects the SSO configuration and redirects to 1Kosmos.

  • Authenticate biometrically using the 1Kosmos mobile app. Confirm you are returned to Slack as an authenticated member.

  • After successful testing, disable Test Mode in the Authentication settings and set SSO to Required if needed.


Attribute mappings

Source (1Kosmos)

Target (Slack)

Description

user.id (persistent)

NameID (persistent)

Persistent identifier for stable Slack account linkage

user.email

email attribute

Used for display and account matching


Integration notes

Slack uses HTTP POST binding exclusively for SAML. HTTP Redirect binding is not supported.

If your AdminX SAML application is configured with Redirect binding, change it to POST before testing. Slack does not support Single Logout (SLO) or session duration values sent by the identity provider.

If SSO is set to Required, Slack guests who are not members of the workspace will still need to sign in using their email and password since the SAML enforcement applies to workspace members only.

For Enterprise Grid, SSO is configured at the organization level and applies to all workspaces in the Grid.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.