✔ SSO URL (Get it here)


This guide covers how to setup SSO in Cognigy.AI with Google as the Identity Provider. After completing this guide, your users can login to Cognigy.AI through Google and will automatically get a user in Cognigy.AI complete with access control.

Adding Custom User Attributes in Google

The first thing you need to do is to add the necessary custom user attributes that Cognigy.AI needs to create the user when they login the first time. To do this, open the menu on the left and navigate to Users > Manage user attributes.


Click on the Add Custom Attribute button in the top right corner to start adding your custom attributes. The user needs to have the following custom attributes set:

  • First Name
  • Last Name
  • Role

If the user already has a First Name and Last Name set, then you don't have to create them again.

The role field determines which role the user will have in Cognigy.AI. The supported roles within Cognigy.AI are as follows: admin, developer, advanced_editor, marketer and basic. You can read more about user roles here. If a user does not have a role assigned, then they will be created as a user with the basic role in Cognigy.AI


e7dbae9-Screenshot_from_2019-05-06_13-16-32.pngAdding the neccessary custom attributes

Creating an Application in Google

The first step is to create a new SAML app within Google. To do this, open the side menu panel of Google and navigate to Apps > SAML Apps. On this page, you can click on the button in the lower right corner to create a new app.

ed91b16-Screenshot_from_2019-05-03_15-39-38.pngCreating a new SAML App

This will open a modal with a lot of different applications you can choose to create.


Creating your own SAML APP

Click on the button in the lower left corner Setup My Own Custom App to complete step 1.

c4e6192-Screenshot_from_2019-05-03_15-40-31.pngCreating a custom SAML application

In step 2, you have to copy the SSO URL and download the Certificate under Option 1, since we need this for later when setting up the identityProvider configuration in Cognigy.AI. Then click on Next.


Naming the SAML App

In step 3 you have to provide a name for the Saml App (e.g. Cognigy). Then proceed to the next step.


Providing SP Details

In step 4, you need to insert the SSO URL (See Cognigy.AI SSO documentation) in the ACS URL and Entity ID fields. You also need to check the Signed Response checkbox and set the Name ID Format to EMAIL

*Please note the current <api-url> for the SSO URL in the Cognigy.AI trial environment is (omits the /new/ as per other API requests).

Adding attribute mapping

In step 5, you need to create the attribute mapping for the attributes we created in the previous section. The mapping need to be as follows:

  • firstName -> The first name of the user
  • lastName -> The last name of the user
  • role -> The role the user should have within Cognigy.AI.

You have now finished creating the Cognigy.AI SAML App in Google. The last thing to do is to activate the application, and you can then proceed to creating the necessary configuration within Cognigy.AI

Configure SSO in Cognigy.AI

After configuring SSO in Google, we are finally ready to create an SSO configuration for your organisation in Cognigy.AI. You do this by sending a POST request to the URL:


(e.g. and attach the following JSON payload to the request with your unique values (see below):

  "idpIssuer": "string",
  "idpLoginEndpoint": "string",
  "idpCertificate": "string"

API Authentication

Read our API reference guide for information about how to send authenticated API requests to Cognigy.AI

The idpIssuer is the Entity ID of the SAML App, which is equal to the SSO URL (See Cognigy.AI SSO documentation).

The idpLoginEndpoint is the SSO URL that you copied in step 1 of the SAML App creation. Looks something like

The idpCertificate is the certificate that you downloaded in step 1 of the SAML App creation. You need to base64 encode the certificate without newlines. In Linux, you can do this by running the following command:


cat ./path-to-file | base64 -w0

The output of the command above should be used as the idpCertificate.

You can now send the POST request to Cognigy.AI with the information you collected from Google. An example payload is below:

    "idpLoginEndpoint": "",
    "idpIssuer": ""

You now have configured Single Sign-on for Google, and your users can now login to Cognigy.AI through Google



Please sign in to leave a comment.

Was this article helpful?
0 out of 0 found this helpful