Integrating Zoom with Workspace ONE Access

In this blog we are going to walk through the process of integrating Zoom with Workspace ONE Access.  There are two very important prerequisites before you can setup the SAML integration with zoom:

  1. You need an approved Vanity URL.
  2. Users need to be created with an SSO Profile (unless you are using JIT)

Zoom Vanity URL

In your Zoom administration console, under Admin -> Account Management -> Account Profile. You can apply for the Vanity URL at the bottom of this screen. Note: It might take some time to get this approved by Zoom.

Zoom Users

When you create users in Zoom, they need to be created with the “SSO User” feature. Users can be created via CSV or through their API. If you are using the API to create users, you will need to include the “SSOCreate” action:

  1. {  
  2.   “action”: “ssoCreate”,  
  3.   “user_info”: {  
  4.     “email”: “”,  
  5.     “type”: 1,  
  6.     “first_name”: “Steve”,  
  7.     “last_name”: “Test”  
  8.   }  
  9. }  

When users are created, you will see the SSO Icon:

Zoom Single Sign-On Setup

In order to configure Zoom for Single Sign-On, you will need to your IDP Metadata from Workspace ONE Access.

  1. Log into the Workspace ONE Administration Console
  2. Go to Catalog -> Web Applications and Click the Settings Button
  3. Click on SAML Metadata ->Identity Provider (IdP) Metadata

In your Zoom Administration Console:

  1. Go to Admin -> Advanced -> Single Sign-On
  2. Enter your Sign-in page URL. This can be found in the “md:SingleSignOnService Binding=”urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST”” tag. This URL will end in /SAAS/auth/federation/sso
  1. Paste your Identity Provider Certificate (Signing). Note: Proper certificate formatting is not required.
  2. Leave the default SP Provider (SP) Entity ID
  3. In the “Issuer (IDP Entity ID)” enter the value from the WS1 Metadata. This can be found entityID field which is on the first line of the metadata. This URL will end in idp.xml.
  4. Select HTTP-POST for the binding.
  5. Select “SHA-256” for the Signature Hash Algorithm.
  1. Under Security, select Sign SAML Request and Save SAML response logs on user sign-in.
  2. Under Provision User, select “Prior to Sign-in” unless you are doing JIT.
  3. Download your metadata at

Workspace ONE Access Single Sign-On Setup

  1. Log into the Workspace ONE Administration Console
  2. Go to Catalog -> Web Apps
  3. Click New
  4. Provide a Name (ie. Zoom) and an Icon
  1. Click Next
  2. Open the previously downloaded metadata and copy/paste into the URL/XML section.
  1. Click Next, Next Save.
  2. Edit the Zoom Application we just created.
  1. Click Next
  2. Enter the correct Username Value that will be used to match the corresponding users in Zoom.
  1. Open Advanced Properties
  2. Select Sign Response, Sign Assertion and include Assertion Signature
  1. Under Signature Algorithm, change the value to SHA256 with RSA
  2. Under Digest Algorithm, change the value to SHA256
  1. Click Next, Next Save
  2. Assign the Zoom App to your users in Workspace ONE Access.

Log into Workspace ONE Access as an end user and test the application.  Use the SAML Response Logs in Zoom to help troubleshoot.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s