How to enable Single Sign On (SSO) on my Dryfta website?

Step 1: Configure your CRM as Identity Provider (IdP)

In your CRM, you will need to enter the following information to configure your IdP. (Replace ‘yourevent‘ with your event domain eg. tedx2020)

SP-EntityID / Issuer miniorangesaml/
ACS (Assertion Consumer Service) URL / Single Sign-On URL (SSO)
Single Logout URL (SLO)
Audience URI
NameID Formaturn:oasis:names:tc:SAML:1.1: nameid-format:emailAddress
Default Relay State (Optional)

Alternatively, you can access these information from the Metadata URL:


Step 2: Configure Dryfta as Service Provider (SP)

To setup Dryfta as the Service Provider, you need to email support desk ( with following information:

Single Sign-On Service URLThe SSO URL that you have noted from your CRM.
IdP Entity ID or Issuer:  The Entity ID that you have noted from your CRM.
X.509 Certificate:Download this certificate from your CRM and send along with the email.


Step 3: Attribute Mapping (Optional)

  • Attributes are user details that are stored in your Identity Provider.
  • Attribute Mapping helps you to get user attributes from your Identity Provider (IdP) and map them to Dryfta user attributes like firstname, lastname etc.
  • While auto-registering the users in your Dryfta site these attributes will automatically get mapped to your Dryfta user details.


AttributeName Identifier
Email    Email
Fist Name    FName
Last Name    LName


Note: Email address is used as the unique identifier in Dryfta.


Step 4: Enable SSO from under Contact Settings

  • Go to your event website’s login page and click on ‘Login with your IdP credentials’ button.
  • If you have configured the settings correctly, you should be able to create a Dryfta account using your CRM’s existing login credentials and get logged-in to your Dryfta dashboard.
  • If you’re unable to log in using your IdP credentials, please email support desk with the error message that is returned and a screenshot of the SSO configuration from your Identity Provider’s dashboard.




The SAML Tracer is an add-on in the Chrome/Firefox browser. Install it and open it when you perform SSO for the user from your browser. It will trace all the logs. When you get the error, export the logs from the SAML Tracer. Choose ‘none’ as value while exporting the logs from SAML Tracer and send the files.


Attributes mapping incorrectly? Let us know and we will run an automated configuration test for your SSO integration and see if the attributes names need to be updated based on what is being sent from the Identity Provider (IdP).


Redirects to 500 Internal Server Error page after logging in with your IdP credentials? Please ensure Email Address is set as the NameID at the Identity Provider (IdP).

I want to approve people before they can purchase tickets for my event. Is that possible?

Of course, it is possible.

Go to Website builder > Navigation. Disable the Buy Tickets page, and Save.

This will make sure users can purchase tickets only when they log in to their dashboard.

Now, go to Settings in the top right corner, choose No for ‘New user registrations are approved automatically’ setting, and Save.

This will make sure users can log in to their dashboard only when you approve them. The login credentials are sent to them on registration but they cant log in unless and until you approve them.