This article discusses functionality that is included in the Aha! Knowledge Advanced plan. Please contact us if you would like a live demo or want to try using it in your account.

Aha! Knowledge | SAML 2.0

Single sign-on (SSO) allows your users to log in to your knowledge base using their existing SAML-enabled ID provider, such as Active Directory, OneLogin, PingIdentity, Okta, and many more. With SSO, you can increase usage of your knowledge base as employees and customers no longer need to keep track of yet another email and password.

Click any of the following links to skip ahead:

How it works

When a user navigates to the knowledge base, they will be presented with the option to authenticate to the knowledge base via SSO only. If they are already logged in to the SSO provider, they will automatically be logged in to your knowledge base without any additional actions.


Enable SSO for any knowledge base

To enable SAML 2.0 SSO in your knowledge base:

  1. Navigate to Settings ⚙️ Account Knowledge Knowledge bases. You will need to be an admin with customization permissions to configure a knowledge base.

  2. Click the knowledge base you want to configure. This opens that knowledge base's settings.

  3. On the Overview tab, find the Authentication settings. Next to the Authentication dropdown, select SSO.

  4. In the SSO identity provider dropdown, select +Add new provider.

  5. On the next screen, enter a Name to identify the SSO configuration. Next to Type, select SAML. Click Save.

  6. Enter the remaining fields following the SAML 2.0 configuration requirements.

    The SAML 2.0 configuration will differ based on the SAML provider that you have selected.

  7. Click Enable SSO to complete the configuration.

Beneath Access for Aha! users, you will find two additional advanced settings. These are disabled by default for knowledge base SSO configurations.

Most Aha! accounts will not need these advanced settings — and you can break your SSO configuration if you do not use them correctly. If you are also using this configuration for both your knowledge base and your ideas portal and you need help configuring these options, you are welcome to reach out to our Customer Success team.

  • Enable CNAME for SSO URLs: This option is rarely needed and will break SSO if not carefully configured. Enabling this option causes SSO to use the CNAME as well. This is not necessary for knowledge bases or for most ideas portals, even when using a CNAME for the portal. It may be useful if your customers have strict corporate networking policies.

  • CNAME: This must match an existing CNAME used in an active ideas portal in your Aha! account. After adding the CNAME click Update URLs and Save or Update SSO. If you have previously configured SSO the URLs must be updated in your external system.


Configure your SAML identity provider

The last step in configuring your knowledge base for SAML 2.0 SSO is to configure your identity provider so that it will send your Aha! account the right information. Particularly, you should ensure that the identity provider is sending the required user attributes to your Aha! account.

  • EmailAddress

  • FirstName

  • LastName

  • NameID

    We strongly recommend using a persistent, unique identifier in this field rather than the user's email address.



We have created an article to help you troubleshoot common SSO configuration issues, complete with explanations and resolutions.

The best place to start in most of these situations is the Recent SSO events for your SSO configuration, at the bottom of the configuration page. Those messages will help diagnose and solve the problem.


If you get stuck, please reach out to our Customer Success team. Our team is made up entirely of product experts and responds fast.

Suite overview
Aha! Roadmaps
Aha! Ideas
Aha! Whiteboards