Setting up SSO SAML via Active Directory Federation Services (ADFS)

V12 4:24 Ent.svg


This article outlines the steps to set up Single Sign-On (SSO) SAML via Active Directory Federation Services (ADFS).

Note: Productboard SAML SSO capabilities are limited to just the provisioning of new users and the logging in of existing users. Permissions and deactivation of users are managed in-app.

In this article:

Relevant to both new and legacy boards

Table of Values

The below table shows a summary of the values which you will need when setting up SSO.

Identifier (Entity ID) productboard
Audience URL
Digest Algorithm SHA1
Encryption Algorithm SHA1
Name ID format EmailAddress
Assertion Algorithm Encrypted
Single SignOn URL
Signature Algorithm SHA1
Single Logout URL


Setting up SSO SAML

Follow these steps to set up your SSO SAML via Active Directory Federation Services:

Note: This guide uses screenshots from Windows Server 2016. Similar steps should be possible on other versions.
  1. On your ADFS Server, Open up AD FS Management.

  2. Right-click on Relying Party Trusts, and click Add Relying Party Trust. This will launch the Add Relying Party Trust Wizard.

  3. On the steps, click Select Data Source, and Choose Enter data about the relying party manually.

  4. on the Step Specify Display Name, enter a Display name “Productboard” and click Next

  5. Choose AD FS profile with SAML 2.0 & click Next.

  6. Select Enable support for the SAML 2.0 SSO Web SSO protocol and enter in the field Replying party SSO service URL adding the Single SignOn URL from the table above and click Next.

  7. Add a Relying party trust identifier, example:
     Also adding
    then click Next.

  8. Click Next until you reach the Finish screen.
  9. Click the box Open the Edit Claim Rules dialog before clicking finish to edit the further configuration. This will launch the Edit Claim Rules window.

  10. Click Add Rule and Choose Claim Rule > Send LDAP Attributes as Claims.

      • Email Address = User identifier/NameID)
      • First Name Accepted Formats:
        • Givenname
        • FirstName
        • First_name
        • Firstname
        • firstName
        • User.FirstName
    • Last Name Accepted Formats:
      • surname
      • LastName
      • last_name
      • lastname
      • lastName
      • User.LastName
  11. From here you can add the Outgoing claim Type as shown below. Once configured click Finish.

    Productboard uses the Email of the user as a login ID. For this to work, you need to set up the Email as the NameID on the SAML login request. This can be achieved by setting up a Transform Rule.
  12. Click Add Rule again, select Transform an Incoming Claim, and click Next.

  13. Enter a Claim rule name, for example, “NameIDProductboard” set up the Outgoing claim type as NameID, and click Finish.

  14. Ensure the order is maintained as shown in the image below (LDAP/AD Attributes followed by the NameIDProductboard), and click Apply.

  15. On the AD FS Management window, right-click on the Relying Party for Productboard and choose properties. Under the Advanced tab, choose SHA­-1 as the Secure hash Algorithm.

  16. On the AD FS Management window, choose Services > Certificates and double click on Token Signing Certificate, which gives you an option Copy to file. By doing this, you will be able to export the X509 certificate from the raw file.

  17. Copy the X509 Certificate from the file, and go to to calculate the Fingerprint. More information on this can be found here.
  18. Decide what roles users/teams should be authenticated in as. Productboard has several roles from Maker Admin / Maker / Contributor / Viewer.
    • The default member role for new members authorized to access Productboard via SAML SSO is a contributor. Use the pb_role custom field/attribute to specify which level of access new members should have.
    • Supported values for pb_role include admin, maker, contributor, viewer.
  19. Now the groups of members have been identified and set up, log in to your Productboard instance, and navigate to Settings ­> Enforce SSO SAML > Manual Configuration.

  20. Input the following:
    • ADFS SSO Endpoint URL
    • ADFS Server Certificate
    • Fingerprint (SHA1) is obtained from the raw data from Step 18.
    • SLO Endpoint
    • Audience / Entity ID (optional)
      Note: To obtain the Endpoint URL, follow these steps, 
      - In your ADFS manager, go to the left sidebar menu and select the Endpoints folder.
      - Search for SSO service endpoint and the entity URL.
      - The SSO service URL usually ends in adfs/services/ls
  21. Upon clicking Save & authorize, enforce SSO via ADFS. You are now set to log in with ADFS SAML SSO on Productboard.


Q: We’re switching to another Idp, how do I disable SSO?

Disable the SAML SSO integration at any time from Productboard settings.

The next time members log in, those who have never set a Productboard password will be required to reset their password to receive login instructions via email - reset the password through here:

Q: My certificate expired and I lost access to Productboard. How can I update the new certificate?

A: Reach out to us through the nifty Zendesk widget in the bottom right of the page, or email us at We can disable the SAML for you and then you will be able to log in and update the certificate manually.

Q: I've authorized SAML SSO, but I forgot to add any users in my Identity provider (IdP) - what should I do?

A: If you feel you aren't ready and need to turn off your authorized SAML SSO settings from the space, the owner of the space can contact our Support team and we'll remove it easily. However, we need an admin who has ownership of the space to request this.

Was this article helpful?
0 out of 0 found this helpful



Article is closed for comments.

Articles in this section

See more
Our Support hours:
Monday to Friday from 9:00 am - 2:00 am CET. Monday to Friday from 0:00 am - 5:00 pm PST.
Productboard Academy
Become a Productboard expert with self-paced courses, quick tip videos, webinars and more.
Product Makers Community
Connect with product leaders, share and find product jobs, and learn how to approach similar challenges. Come join our Product Makers community.