In this article we will outline setting up Auth0 as a SAML Identity Provider so that we can utilize Telnyx's Single Sign-On feature. Auth0 provides a platform to authenticate, authorize, and secure access for applications, devices, and users. It is one of the many SAML providers that Telnyx supports for our SSO feature.

NOTE: If you experience technical difficulties while attempting to set up your Auth0 SSO with Telnyx, its possible your provider is experiencing outages/maintenance. You can check the status of Auth0's features at https://status.auth0.com/.


To begin, navigate to your Auth0 admin panel, and on the left-hand side of the page click on Applications. Click on the purple "+ Create Application" button in the top right of the page.

On the next page, enter the desired name of your choice and select the Regular Web Applications option from the list. Click Create.

On the following page, click the "Add-ons" tab at the top and enable SAML 2 Web App using the switch.

A pop up window will appear displaying some of the parameters for your SAML app. Right click and copy the download link for Identity Provider Metadata.

Next, navigate to your Organization section of the Telnyx Mission Control Portal and create an Organization if you have not already. Once created, navigate to the Single Sign-On section of the portal and click the green Enable Single Sign-On button.

Singe Sign-On section of the Telnyx Mission Control Portal

You will be presented with the following fields:

  • Fill in the Authentication Provider Name and Short Name with the values you desire. Please note that the Short Name will be part of the SSO URLs.

  • For the IdP Metadata URL, paste the URL you copied from the Auth0 Admin page.

Click on Import IdP Settings & Save. Scroll down to the
"Authentication Provider Generated Config" section and take note of the values for
Assertion Consumer Service URL, Service Provider Entity ID, and
Name Identifier Format.

Navigate back to the Auth0 Admin portal and click on the Settings tab. Use the value generated for Assertion Consumer Service URL on the Telnyx Mission Control Portal and paste it in the field Application Callback URL.

In the "Settings" field below Application Callback URL, you are required to enter a JSON of your Telnyx Portal config settings we received above. To create this JSON, use these values for the fields:

  1. The audience field is the Service Provider Entity ID .

  2. The recipient field is the Assertion Consumer Service URL.

  3. The nameIdentifierFormat is the Name Identifier Format.

  4. All the other fields can be copied from the example below.

{"audience": "https://apidev.telnyx.com/sso/saml/metadata/SHORTNAME", "recipient": "https://apidev.telnyx.com/sso/saml/auth/SHORTNAME", "signResponse": true, "nameIdentifierFormat": "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress", "nameIdentifierProbes": [ "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress" ], "authnContextClassRef": "urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified"}

Once all the values have been entered, scroll down to the bottom and click Enable.

When you are ready to enable the configs, on the Telnyx Mission Control Portal, click on “Enable Single Sign-On” and “Save Changes”.

Your chosen settings are now in effect! This will send all users in your organization an email informing them that SSO is now enabled. Your users will still be able to login using username/password for the next 72 hours. After that, they will be required to use SSO.

Can't find what you're looking for? Click the chat bubble at your lower right-hand corner and talk to the support team!

Did this answer your question?