Asana
Last reviewed: 3 months ago
This guide covers how to configure Asana ↗ as a SAML application in Cloudflare Zero Trust.
- An identity provider configured in Cloudflare Zero Trust
- Super admin access to an Asana Enterprise, Enterprise+, or Legacy Enterprise account
- In Zero Trust ↗, go to Access > Applications.
- Select Add an application > SaaS > Select.
- For Application, select Asana.
- For the authentication protocol, select SAML.
- Select Add application.
- Fill in the following fields:
- Entity ID:
https://app.asana.com/
- Assertion Consumer Service URL:
https://app.asana.com/-/saml/consume
- Name ID format: Email
- Entity ID:
- Copy the SSO endpoint and Public key.
- Select Save configuration.
- Configure Access policies for the application.
- Select Done.
- In Asana, select your profile picture > Admin console > Security > SAML authentication.
- Under SAML options, select Optional.
- Fill in the following fields:
- Sign-in page URL: SSO endpoint from application configuration in Cloudflare Zero Trust.
- X.509 certificate: Public key from application configuration in Cloudflare Zero Trust. Wrap the public key in
-----BEGIN CERTIFICATE-----
and-----END CERTIFICATE-----
.
- Select Save changes.
-
Open an incognito browser window and go to your Asana URL. You will be redirected to the Cloudflare Access login screen and prompted to sign in with your identity provider.
-
After this is successful, you may want to require users to log in via SSO. In Asana, select your profile picture > Admin console > Security > SAML authentication. Under SAML options, select Required for all members, except guest accounts.