How to set up SSO with SAML

In this article, we'll explain how to configure your Datawrapper workspace so you can use SAML-based Single Sign-On.

Single Sign-On is available for users on the Enterprise plan.
You can find more information about our pricing options here

To use SSO with SAML, you'll first have to set up a new app integration in your Identity Provider of choice and then navigate to the app's SAML settings. Below, we've linked guides on how to do so for some common IdPs:

Once you are ready to enter the SAML settings information for your integration, follow these steps:

  1. Open your Datawrapper workspace settings and navigate to the Single Sign-On section. Enable the Enable Single Sign-On switch and select SAML2 as protocol:
  2. In your IdP SAML settings, specify the following values for the SSO URL aka. Assertion Consumer Service or ACS URL, and Entity ID:
  3. SSO or ACS URL (Callback URL):
    https://app.datawrapper.de/signin/sso
    Audience URI (Entity ID):
    https://app.datawrapper.de/sp

    The expected application username and Name ID format is the user's email address.

  4. In your settings, retrieve the IdP SSO URL and Identity Provider Issuer values, as well as the Certificate file.
    1. In Okta, the certificate can be found by clicking on the View Setup Instructions button in the application's Sign On tab. 
    2. In Entra ID, navigate to the SAML Certificates section and select Download for Certificate (Raw).
  5. Copy the first two values into the SSO URL and Entity ID fields in Datawrapper. Access the certificate as raw text by opening the file in a text editor and copy the text into the Certificate field:
  6. Once everything is filled in, the team signin URL at the very bottom of the page is ready to be used for signing into Datawrapper with your identity provider: