How to Enable SSO Prefill

August 1, 2024

This guide explains the required steps to set up SSO Prefill for an already configured SAML SSO application. After setting up the attributes sending configurations on your SSO app, you can enable SSO Prefill for your forms.

Youtube Embed Poster: Sm0YiIbbJJs

Here’s how it works:

  1. Once you’ve built your form, navigate to the Publish tab and select Prefill in the left navigation. Then select SSO Prefill.
How to Enable SSO Prefill Image-1

2. Next, toggle the switch to Enable SSO Prefill.

3. You can then choose which attributes (i.e., name, email, job title, department, etc.) to prefill and map to your form fields when someone opens your form. The attributes will be automatically pulled from the user’s profile stored on your SSO server.

How to Enable SSO Prefill Image-2

To use the SSO Prefill feature with your Jotform Enterprise forms, you must configure sending attributes within your SSO app. You can check for platform-specific instructions from the list below:

OKTA IDP for SSO Prefill

This guide explains the steps to set up SSO Prefill for an already configured OKTA SAML SSO Application.

What would you need?

  • Okta Account with a working SAML Application with Jotform Enterprise
  • Admin permissions for the said Okta Account

Steps:

  1. Log in to your Okta admin account and go to the Admin page.
The Admin button in Okta
  1. Go to Applications and select your Jotform SAML app.
An Applications menu in Okta
  1. Go to General at the top, then edit your SAML settings.
An Edit link in Okta SAML settings
  1. Select Next to go to Configure SAML.
A Next button in Okta SAML general settings
  1. Enter the following under Attribute Statements (optional):
An attribute statement table in Okta SAML settings
NameValue
First Nameuser.firstName
Last Nameuser.lastName
Emailuser.email
Phone Numberuser.primaryPhone
  1. Select Next > Finish at the bottom to save the settings.

G-Suite for SSO Prefill

This section of the guide aims to explain the steps required to set up SSO Prefill for an already configured G-Suite SSO Application.

What would you need?

  • G-Suite Account with a working SAML Application for Jotform Enterprise
  • Admin permissions for the G-Suite Account

Steps:

1. Go to the G-Suite Admin page and navigate to the Apps:

How to Enable SSO Prefill Image-3

2. Go to SAML Apps:

How to Enable SSO Prefill Image-4

3. Select your current SAML configuration under Services:

How to Enable SSO Prefill Image-5

4. Select “Configure SAML attribute mapping”:

How to Enable SSO Prefill Image-6

5. Set the following values by clicking “ADD MAPPING” button:

How to Enable SSO Prefill Image-7

Google Directory attributes: First name

App attributes: First Name

Google Directory attributes: Last name

App attributes: Last Name

Google Directory attributes: Primary email

App attributes: Email

Google Directory attributes: Phone number

App attributes: Phone Number

How to Enable SSO Prefill Image-8

6. Save the configuration and proceed to Enabling SSO Prefill for your Jotform Enterprise forms.

AZURE for SSO Prefill

The required steps for setting up SSO Prefill for an already configured Azure SSO Application.

What would you need?

  • Azure Portal Admin Account with a working SAML Application with Jotform Enterprise
  • Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the app permissions for the Azure Portal Account

Steps:

1. Go to Azure Portal Home page and navigate to Enterprise applications -> All applications and select your Jotform SSO application:

How to Enable SSO Prefill Image-9

2. Select Single sign-on from the menu on the left side:

How to Enable SSO Prefill Image-10

3. Proceed to the Edit button in the “User Attributes & Claims” section:

How to Enable SSO Prefill Image-11

4. Create or update claims pairs for Claim name and Value as shown below:

Claim name: First Name

Value: user.givenname

Claim name: Last Name

Value: user.surname

Claim name: Email

Value: user.mail

Claim name: Phone Number

Value: user.telephonenumber

How to Enable SSO Prefill Image-12

5. Save and proceed to Enabling SSO Prefill for your Jotform Enterprise forms.

AD FS for SSO Prefill

In order to set up SSO Prefill for an already configured AD FS Relying Party Trust, please follow the steps below.

What would you need?

  • AD FS Server with working SAML 2.0 SAML Application for Jotform Enterprise
  • Management Permissions for AD FS

Steps:

1. Open AD FS Management Console and go to “Relying Party Trusts” on the left.

2. Right click on the application you wish to edit and select “Edit Claim Issuance Policy”:

How to Enable SSO Prefill Image-13

3. Click “Add Rule…” button and select the “Send LDAP Attributes as Claims”:

How to Enable SSO Prefill Image-14

4. Click “Next” button and enter a “Claim Rule Name”:

How to Enable SSO Prefill Image-15

5. Select “Active Directory” for the Attribute Store dropdown and set the mapping table as follows.

Please select the LDAP Attribute from the dropdown list and type in manually the Outgoing Claim Type names:

Attribute: Given-Name

Outgoing Claim Type: First Name

Attribute: Surname

Outgoing Claim Type: Last Name

Attribute: E-Mail-Addresses

Outgoing Claim Type: Email

Attribute: Telephone-Number

Outgoing Claim Type: Phone Number

How to Enable SSO Prefill Image-16

6. Click Finish to finish editing Claim Rule > Apply to save the changes on Claim Issuance Policy and OK to close Claim Issuance Policy.

7. Proceed to Enabling SSO Prefill for your Jotform Enterprise forms.

Push Notifications for Jotform Apps
Academy Logo

Introduction to Form Building

Prefill

Go to course :Prefill
lesson-2 - image
Contact Support:

Our customer support team is available 24/7 and our average response time is between one to two hours.
Our team can be contacted via:

Support Forum: https://www.jotform.com/answers/

Contact Jotform Support: https://www.jotform.com/contact/

Send Comment:

Jotform Avatar
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Podo Comment Be the first to comment.