Articles on: CodeBot Platform & Setup

SSO Access to CodeBot Platform

This article outlines the process for configuring Single Sign-On (SSO) access to the CodeBot platform. SSO enables users to securely log in using their organization’s identity provider (IdP), eliminating the need for separate credentials.


Prerequisites


Before initiating the SSO setup, ensure the following:


  • Your organization uses an Identity Provider (IdP) that supports SAML 2.0.
  • You have access to share and receive metadata files between systems.
  • A technical resource from your team is available to assist with IdP configuration.


Step 1: Share CodeBot Metadata with Your Team


Provide the following CodeBot Service Provider (SP) metadata file to your internal IT or Identity Management team:


  • US Environment:

https://app.sfcodebot.com/saml/metadata.xml


  • EU Environment:

https://eu.sfcodebot.com/saml/metadata.xml


  • CA Environment:

https://ca.sfcodebot.com/saml/metadata.xml


This metadata file contains the necessary configuration details required to establish trust between CodeBot and your IdP.


Step 2: Configure Identity Provider (IDP)


Your internal team must:


  • Import the CodeBot metadata file into your IdP.
  • Configure SAML settings (e.g., Entity ID, Assertion Consumer Service URL).
  • Set up user attribute mappings if required (e.g., email, username).


Step 3: Share IdP Metadata with CodeBot


Once the IdP configuration is complete:


  • Export the IdP metadata file from your system.
  • Share this file with the CodeBot team.


This file is required to complete the SSO configuration on the CodeBot side.


Step 4: Enable SSO in CodeBot



After receiving the IdP metadata:


  • The CodeBot team will configure and enable SSO for your tenant.


Step 5: Verification & Testing



  • Test login via SSO with selected users.
  • Verify correct redirection and authentication flow.
  • Confirm user access and permissions are functioning as expected.


Once the setup is complete:


  • Users will be able to log in to CodeBot using their organization’s SSO credentials.


If users are unable to log in:


  • Verify that the IdP metadata shared is correct and up to date.
  • Ensure user accounts exist and are properly mapped in CodeBot.


To enable SSO for your SuccessFactors instance please refer to the article below:


https://help.sfcodebot.com/en/article/updating-the-codebot-idp-certificate-for-sso-enabled-instances-1kqco0t/#3-overview



Note: If you need any assistance or would like further training on the process, please don’t hesitate to reach out to us — we’re here to help!


Thank you!


Updated on: 30/03/2026

Was this article helpful?

Share your feedback

Cancel

Thank you!