Couchdrop Knowledge Base
Couchdrop HomepageDevelopersLogin
  • Welcome
  • Features
    • SFTP Server
      • Storage
      • Users
      • How to connect
      • Enabling FTPs
      • Host key authentication
    • Transfer Automations
      • Creating an Automation
      • Supported Actions
      • Variables
      • Troubleshooting
    • Shared Links
    • Upload Links
    • Inbound Mailboxes
    • Inbound Webhooks
    • File Actions
    • Inbound AS2 Stations
  • Administration
    • Users and Groups
      • User Roles
      • Creating Users
      • The Root Directory
      • Passwords and RSA Keys
      • Features Access
      • Firewalls and ACLs
    • Storage Connections
      • SharePoint
      • Azure Files
      • Amazon S3
      • Google Workspace
      • Google Drive
      • Box
      • Dropbox
      • Egnyte
      • Outbound AS2
      • External SFTP Server
      • Windows / Mac File Server
        • Server Requirements
        • Proxy Configuration
        • Non-GUI Environments
        • Running the Couchdrop Agent as a Service
        • Logging and Debugging
      • Others
        • OneDrive
        • Azure Blob
    • Folder Permissions
    • Alerting and Notifications
    • Custom Domains
    • SSO and Single Sign-on
      • SAML SSO
      • SCIM - Azure
      • SCIM - Okta
    • Security
      • Password Policies
      • Account Lockout
      • Account expiry
      • Two Factor Authentication
    • Other
      • Static IPs
      • Malware Scanning
  • Walkthroughs
    • Using SFTP Clients
      • OpenSSH SFTP
      • How to use SFTP with Cyberduck
      • How to use SFTP with FileZilla
      • Using SFTP with Golang
      • Using Python with SFTP
      • Using SFTP with Java
      • Using SFTP with Bash
      • Using SCP
    • SFTP To SharePoint
    • SFTP to Azure Files
    • Automated file transfers to SharePoint
    • Email Inboxes with Couchdrop
    • Delegating Domain-Wide Authority in Google Workspace
  • Other
    • FAQs
    • Trust/Security Center
    • Login to Couchdrop
    • API Documentation
Powered by GitBook

Couchdrop

  • Homepage
  • Register
  • Login

Platform

  • Cloud SFTP Server
  • Cloud FTP Server
  • Automated Transfers
  • Mailboxes and Inboxes

Copyright Couchdrop Limited 2025

On this page
  • Pre-Requisites
  • Configuration Steps
  • Azure SAML Setup

Was this helpful?

Export as PDF
  1. Administration
  2. SSO and Single Sign-on

SAML SSO

PreviousSSO and Single Sign-onNextSCIM - Azure

Last updated 2 months ago

Was this helpful?

Couchdrop can be configured for SAML authentication via the web interface.

Pre-Requisites

Users must already exist in Couchdrop for SAML login and as Couchdrop supports login via SFTP and FTP, they must have a password set as well. SAML Login is only available through the web interface.

Configuration Steps

Enable SAML SSO

Login to Couchdrop as the owner. Navigate to Administration --> SSO --> SAML SSO

You will need to provide the following details to Couchdrop so that it can connect to your identity provider.

Azure SAML Setup

Required Fields

Field
Example
Description

SAML IDP Identity ID

https://sts.windows.net/6c4526c1-a311-479b-af9c-1e0ecc4122be/

(Microsoft Entra Identifier) See Step 4 of your Entra Single Sign-On App Settings.

SAML IDP SSO URL

https://login.microsoftonline.com/6c4526c1-a311-479b-af9c-1e0ecc4122be/saml2

(Login URL) See Step 4 of your Entra Single Sign-On App Settings.

SAML IDP Certificate

-----BEGIN CERTIFICATE----- MIIC8DCCAdigAwIBAgIQeTBhv/RYZrpAXGf+yF185DANBgkqhkiG9w0BAQsFADA0MTIwMAYDVQQD ..... -----END CERTIFICATE----

Certificate (Base64) See Step 3 of your Entra Single Sign-On App Settings.

SAML IDP Email Attribute Key

http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress

The example provided is the default for all Microsoft Single Sign-On Apps.