# SSO Field Guide

### Introduction

Integrating single sign-on (SSO) with Zoom offers administrators user management and security options that can simplify account management. Once configured, users authenticate using their company credentials against your company’s identity provider instead of using alternative authentication methods like Google or Facebook integrations, or a direct username and password with Zoom.

This document provides a comprehensive overview of SSO configurations and settings within Zoom, in addition to troubleshooting and security information.

### SSO Integrations

#### <mark style="color:blue;">SSO Requires a Vanity URL to get started</mark>

An account must have an approved vanity URL before configuring SSO. Once the Vanity URL is approved, Zoom administrators can access the [SSO configuration](https://zoom.us/account/sso) page through the advanced options submenu on the web portal. Refer to our support article on [Vanity URLs](https://support.zoom.us/hc/en-us/articles/215062646-Guidelines-for-Vanity-URL-requests) for more information.

#### <mark style="color:blue;">Zoom SSO works with any SAML 2.0 identity provider</mark>

Zoom can integrate with any identity provider that supports Security Assertion Markup Language (SAML) 2.0 authentication. Although there are many documented integration walkthroughs, some identity providers do not provide documentation for integrating with Zoom. Accounts that cannot locate configuration instructions are encouraged to reach out to their identity provider for more information.

#### <mark style="color:blue;">Zoom administrators can manage user profile information and licensing through SAML response mapping or SCIM integrations</mark>

Administrators can manage user profile information and licensing through SAML response mapping or System for Cross-Domain Identity Management (SCIM) Application Programming Interface (API) requests, depending on the features available from the identity provider. Both user management methods offer near-equal functionality for profile information mapping and licensing management, but some SCIM mappings require manual configuration.

For a comprehensive list of SCIM capabilities, refer to our [SCIM API documentation](https://marketplace.zoom.us/docs/api-reference/scim-api/methods#tag/User).

#### <mark style="color:blue;">Zoom administrators can manage user account status through SCIM, but not SAML</mark>

Because SCIM allows identity providers to communicate directly with Zoom at any time, user accounts can be *activated*, *deactivated*, *created*, or *deleted* through SCIM integrations automatically. For example, if a user’s account in Active Directory is disabled, or if they are unassigned the application, SCIM can send an automatic deactivation request for the user’s account within Zoom. This feature is dependent on the capabilities of the identity provider’s SCIM application and functionality may vary by provider.

#### <mark style="color:blue;">Limited identity providers offer SCIM for Zoom</mark>

Many identity providers do not have a SCIM integration built for Zoom as a part of their services. Accounts using an identity provider that does not support SCIM with Zoom must use SAML response mapping for automated user management.

#### <mark style="color:blue;">SCIM requires an associated domain to automatically provision users</mark>

Accounts that use SCIM to manage and provision users for SSO **must** associate the email domain with Zoom. Failure to associate the domain will result in user provisioning failures. Refer to our support article on [Associated Domains](https://support.zoom.us/hc/en-us/articles/203395207) for more information on the process.

#### <mark style="color:blue;">The following SSO integrations are documented</mark>

{% hint style="success" %}
**Zoom Tip**

Click the ✔ in the Provider or Zoom Documentation column to open a new window to instructions.
{% endhint %}

<table><thead><tr><th width="211.5616455078125"></th><th>Provider Documentation</th><th>Zoom Documentation</th><th>Supports SCIM</th></tr></thead><tbody><tr><td>auth0</td><td><a href="https://marketplace.auth0.com/integrations/zoom-sso">✔</a></td><td><br></td><td><br></td></tr><tr><td>ADFS</td><td><br></td><td><a href="https://support.zoom.us/hc/en-us/search/click?data=BAh7DjoHaWRpBI%2F8Dww6D2FjY291bnRfaWRpAxQqAjoJdHlwZUkiDGFydGljbGUGOgZFVDoIdXJsSSJXaHR0cHM6Ly9zdXBwb3J0Lnpvb20udXMvaGMvZW4tdXMvYXJ0aWNsZXMvMjAyMzc0Mjg3LUNvbmZpZ3VyaW5nLVpvb20tU1NPLXdpdGgtQURGUwY7CFQ6DnNlYXJjaF9pZEkiKTVlZWY5ZWQ2LTJjNWItNDRhMS1hYzdhLTQ3ODc2ZmZjYTM2YgY7CEY6CXJhbmtpBzoLbG9jYWxlSSIKZW4tdXMGOwhUOgpxdWVyeUkiCFNTTwY7CFQ6EnJlc3VsdHNfY291bnRpcQ%3D%3D--06df9ad44c3254348746ce701bdf45cdf6fd36db">✔</a></td><td>AD Sync Tool</td></tr><tr><td>Clever</td><td><a href="https://support.clever.com/hc/s/articles/360040481852">✔</a></td><td><br></td><td><br></td></tr><tr><td>CyberArk</td><td><a href="https://docs.cyberark.com/Product-Doc/OnlineHelp/Idaptive/Latest/en/Content/Applications/AppsWeb/Zoom.htm">✔</a></td><td><br></td><td><br></td></tr><tr><td>Duo</td><td><a href="https://duo.com/docs/sso-zoom">✔</a></td><td><br></td><td><br></td></tr><tr><td>Entra ID (formerly Azure)</td><td><a href="https://docs.microsoft.com/en-us/azure/active-directory/saas-apps/zoom-tutorial">✔</a></td><td><a href="https://support.zoom.us/hc/en-us/articles/115005887566-Configuring-Zoom-with-Azure">✔</a></td><td>✔</td></tr><tr><td>Google</td><td><a href="https://support.google.com/a/answer/7577316?hl=en">✔</a></td><td><a href="https://support.zoom.com/hc/en/article?id=zm_kb&#x26;sysparm_article=KB0066144">✔</a></td><td><br></td></tr><tr><td>JumpCloud</td><td><a href="https://support.jumpcloud.com/support/s/article/single-sign-on-sso-with-zoom1-2019-08-21-10-36-47">✔</a></td><td><br></td><td>✔</td></tr><tr><td>miniOrange</td><td><a href="https://www.miniorange.com/zoom-us-saml-single-sign-on-solution">✔</a></td><td><br></td><td><br></td></tr><tr><td>Okta</td><td><a href="https://saml-doc.okta.com/SAML_Docs/How-to-Configure-SAML-2.0-for-Zoom.us.html">✔</a></td><td><a href="https://support.zoom.us/hc/en-us/search/click?data=BAh7DjoHaWRsKwiKBeDGGgA6D2FjY291bnRfaWRpAxQqAjoJdHlwZUkiDGFydGljbGUGOgZFVDoIdXJsSSJYaHR0cHM6Ly9zdXBwb3J0Lnpvb20udXMvaGMvZW4tdXMvYXJ0aWNsZXMvMTE1MDA1NzE5OTQ2LU9rdGEtY29uZmlndXJhdGlvbi13aXRoLVpvb20GOwhUOg5zZWFyY2hfaWRJIikxZmJjMjhhNC03OTM1LTRmOGYtOTllMi02YTBiYTgwNzk0NTYGOwhGOglyYW5raQw6C2xvY2FsZUkiCmVuLXVzBjsIVDoKcXVlcnlJIhVjb25maWd1cmluZyB6b29tBjsIVDoScmVzdWx0c19jb3VudGkC6AM%3D--97242e750cce02ed61dfa39c762dcb565fb71ea6">✔</a></td><td>✔</td></tr><tr><td>OneLogin</td><td><a href="https://www.onelogin.com/connector/zoom">✔</a></td><td><a href="https://support.zoom.us/hc/en-us/articles/204752775-Configuring-Zoom-with-OneLogin">✔</a></td><td>✔</td></tr><tr><td>Ping Identity</td><td><a href="https://docs.pingidentity.com/bundle/pingfederate-zoom-connector/page/ejj1584646507320.html">✔</a></td><td><br></td><td>✔</td></tr><tr><td>Shibboleth</td><td><br></td><td><a href="https://support.zoom.us/hc/en-us/search?utf8=%E2%9C%93&#x26;query=configuring+zoom">✔</a></td><td><br></td></tr></tbody></table>

#### <mark style="color:blue;">On-premises Active Directory can use the AD Sync Tool instead of SCIM</mark>

Accounts that want to automate user provisioning through SCIM but do not have a cloud-based identity provider can use the Active Directory (AD) Sync Tool application developed by Zoom for managing their users. This application runs on Oracle JDK 8 and simulates SCIM provisioning by managing users through API commands. See our support article on the [AD Sync Tool](https://support.zoom.us/hc/en-us/articles/115005865543-Managing-the-AD-Sync-Tool) for more information.

{% hint style="success" %}
**Zoom Recommendation**

The AD Sync Tool requires precise configuration for user management. Thorough testing and review of the tool’s configuration is required before full implementation to avoid service disruption.
{% endhint %}

#### <mark style="color:blue;">Identity providers can even authenticate meeting participants that don't have a Zoom account</mark>

Accounts that want to require users to authenticate their identity but do not wish to provide Zoom accounts can configure an external authentication profile with their identity provider. When enabled for a meeting, users who attempt to join must authenticate their login credentials against your identity provider to gain access. This is a common configuration for schools that do not provide accounts to all students but require authentication to join classes. Refer to our support article on [configuring external authentication](https://support.zoom.us/hc/en-us/articles/360053351051-Configuring-external-authentication-for-K-12-schools) for more information.

#### <mark style="color:blue;">Changing the identity provider requires re-configuring SSO within Zoom</mark>

Accounts that are changing identity providers must redo their SSO configuration within Zoom. This includes updating all fields within the configuration page to match their new identity provider. Accounts are encouraged to confirm that SAML response mappings will not change with the new identity provider.

No additional configurations or changes should be required, assuming there are no further changes.

#### <mark style="color:blue;">Customers with sub-accounts can configure SSO from the master or sub-account</mark>

Customers with sub-accounts have two options for configuring SSO:

1. All users authenticate using the master account’s Vanity URL and are automatically logged into the sub-account through advanced SAML mapping ([some mapping limitations apply](#mapping-users-to-a-sub-account-will-only-apply-a-meeting-license-and-add-ons)); or
2. Each sub-account has a unique Vanity URL and independent SSO configuration, used exclusively by members of that sub-account

Each configuration offers unique benefits, with the second option offering the most flexibility. Customers considering implementation of either configuration should discuss with their account team which configuration is best suited for their needs.

### SSO Settings & Security

Zoom administrators can choose the optimal security and settings options for their organization when configuring an SSO integration with Zoom. This section explains these settings and their implications for an SSO integration.

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXeXmQBNFuErBRXMkNDUpAzmtzjie--UtxIekSeSTm79LDCCRI-C1Omn7liMtPzVRH3zZkpLLt262eCCw3g-a71DPZ0wqu4qrHV3UnkdMy_gU7YXwYLrM81TYM0yBvm28gBM-tpmpg?key=ug1dFE_WGWGnyMfD5tJnNw" alt=""><figcaption><p>Example of SSO integration settings.</p></figcaption></figure>

#### <mark style="color:blue;">Zoom supports signed login and logout SAML requests</mark>

Zoom administrators that require additional service provider authentication can configure Zoom to sign all login and logout requests to the identity provider.

Accounts that use this setting may require a certificate rotation if their identity provider does not support dynamic metadata refreshment. See our support article on [certificate rotation](https://support.zoom.us/hc/en-us/articles/360057049812-Zoom-SSO-certificate-rotation-) for more information.

#### <mark style="color:blue;">Zoom supports encrypted SAML assertions when authenticating</mark>

Zoom administrators can configure Zoom to support encrypted assertions when authenticating. If this setting is enabled, unencrypted assertions will be discarded. Accounts that use this setting may require SSO certificate rotation if their identity provider does not support dynamic metadata refreshment. See our support article on [certificate rotation](https://support.zoom.us/hc/en-us/articles/360057049812-Zoom-SSO-certificate-rotation-) for more information.

#### <mark style="color:blue;">Zoom administrators can enforce automatic logout after a defined length of time</mark>

Zoom administrators can configure Zoom to automatically log users out of active sessions after defined lengths of time, customizable from 15 minutes to 180 days. This process will set the Zoom access token to expire at the predetermined length once the token is generated. This token has no relationship to an identity provider and is unique to Zoom.

#### <mark style="color:blue;">SAML response logs can be saved for troubleshooting</mark>

Zoom can save SAML response logs from authentication attempts for seven days after an authentication. These response logs can be an invaluable tool for troubleshooting configuration and user errors, in addition to SAML response mapping configurations. Review the section on [troubleshooting errors with SAML response logs](#using-saml-response-logs-to-troubleshoot) for more information.

{% hint style="success" %}
**Zoom Recommendation**

Enable saving SAML response logs to make troubleshooting easier.
{% endhint %}

#### <mark style="color:blue;">Provisioning at sign-in can create accounts instantly and is the easiest provisioning option</mark>

When SSO is set to provision *At Sign-In* (also known as just-in-time provisioning), any authorized user within the identity provider can authenticate into Zoom. Users that do not have an existing account will have one created immediately upon sign-in.

Provisioning at sign-in can simplify Zoom rollouts to a company by allowing users to create their accounts at the time of authentication instead of requiring proactive user creation. Combined with SAML response mapping, an entire user profile and licensing is ready within seconds of a user’s first authentication.

Additionally, provisioning at sign-in can dynamically create the SSO login type for pre-existing accounts. If a user has an existing Zoom account with a username and password, an SSO login type will be created upon sign-in with this configuration.

#### <mark style="color:blue;">Provisioning prior to sign-in requires pre-created accounts with an SSO login type</mark>

Provisioning users for SSO *prior to sign-in* requires that authenticating users have **both** an existing Zoom account, and that the account has an SSO login type created. This type of provisioning is often paired with SCIM provisioning due to the automated account creation process but is not exclusive to it. Zoom users that consolidate into the company account through associated domains or a direct invite are not likely to have the SSO login type.

Zoom Administrators can confirm whether an account has an SSO login type by viewing the user account on the [User Management](https://zoom.us/account/user#/) page within the web portal and looking for the “SSO” icon underneath the user’s email.

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXcreMLZApFm8ejVa0ka9Z8eqYuNxu79PNBLNRQMSXiYuhd7i_yVll8yuREcJto4NqP1PWcodZJcONRGl97_uQx7fIg7XIaESAtwqFmtg94DGrwzWgJJSPITSivg8XydSZEJPGMY7Q?key=ug1dFE_WGWGnyMfD5tJnNw" alt=""><figcaption><p>Location of the SSO icon under a user's email.</p></figcaption></figure>

If the icon is present, the user is provisioned for SSO; if the icon is missing, the user will not be able to sign in via SSO while pre-provisioning is enabled until it is added. A Zoom administrator can add this login type by adding users in bulk via a CSV file and selecting the “SSO User” option or have the user authenticate while Provision at Sign-in is enabled.

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXcoPrIr5MH76SjZUpz7giqvgeI20rLRN6ZRT__7ltUhhuaWNyH4nM0EePcE7V3aFx1tbMqPICLZ_9dHs7Gc3_tXWOGZ4KOKQzPCdb4meMTpRxcBvNOJ2QwQmAisWT-KtWUzl_B1gQ?key=ug1dFE_WGWGnyMfD5tJnNw" alt="" width="563"><figcaption><p>Example showing the SSO User option for bulk uploading.</p></figcaption></figure>

{% hint style="success" %}
**Zoom Recommendation**

To prevent users from being unable to sign in, use provisioning at sign-in when first configuring SSO on an account. Switch to pre-provisioning if desired once you have confirmed your users are pre-provisioned and you have pre-provisioning methods in place.
{% endhint %}

#### <mark style="color:blue;">A domain must be associated and managed to enforce SSO authentication</mark>

Zoom administrators can enforce SSO authentication *only* if the email domain is associated and managed within Zoom. When this is enabled, all users authenticating using your company domain(s) will be automatically redirected to your identity provider’s authentication page, regardless of platform.

Once the domain is approved and managed, a Zoom administrator can enforce SSO authentication through your account’s [security page](https://zoom.us/account/setting/security) under **Sign-in Methods**. Refer to our support article on [Associated Domains](https://support.zoom.us/hc/en-us/articles/203395207) for more information on associating and managing a domain.

#### <mark style="color:blue;">Specified users can be exempt from enforced SSO authentication</mark>

Zoom administrators can exclude specific users from enforced SSO authentication. Excluding specific users (such as an admin account) may be useful if an SSO configuration breaks and an account administrator needs non-SSO access to the Zoom account. Admins that are exempt can sign into admin.zoom.us at any time in the event of an account lockout or broken SSO configuration (user must have the standard **admin** role). If a Zoom admin cannot access the account, they must contact Zoom Support for assistance.

To enable a user exception, navigate to the account [security page](https://zoom.us/account/setting/security) on the web portal under advanced options, locate the list of enforced domains, and add an exception through the edit list.

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXe23kx3YxMdjE3_CZSecp2CF3HA42tOP80rwvDJo5JApEYW3sPKjo4p2qyJFQ912BHysKjQ51M5p04hb_ODjApxTyL3bh9-PooZZ1lrf1odC8z1n8xtOcDjROAjCO-45Idn5nVglw?key=ug1dFE_WGWGnyMfD5tJnNw" alt="" width="563"><figcaption><p>Example of domain list for SSO.</p></figcaption></figure>

#### <mark style="color:blue;">Mobile and desktop clients can be configured to require users to use SSO authentication</mark>

Zoom clients can be preconfigured to automate SSO functionality, including automatic login, automatic logout, SSO-only authentication on the device, and more through Group Policy, mobile device management (MDM) services, and mass deployment clients.

For a complete list of configuration possibilities, refer to our configuration options for [Group Policy](https://support.zoom.us/hc/en-us/articles/360039100051), [iOS](https://support.zoom.us/hc/en-us/articles/360022302612-Using-MDM-to-configure-Zoom-on-iOS), [Android](https://support.zoom.us/hc/en-us/articles/360031913292-Using-MDM-to-configure-Zoom-on-Android), [Mac](https://support.zoom.us/hc/en-us/articles/115001799006-Mass-deploying-preconfigured-settings-for-Mac) and [Windows](https://support.zoom.us/hc/en-us/articles/201362163-Mass-deployment-with-preconfigured-settings-for-Windows).

#### <mark style="color:blue;">Office 365 users can automatically sign in to the Zoom for Outlook add-in using SSO credentials</mark>

Customers that use Office 365 can automatically sign their users into the Zoom for Outlook add-in using SSO credentials. This can be paired with a [custom add-in manifest](https://support.zoom.us/hc/en-us/articles/360041403311) that pre-populates the account’s vanity URL, creating a seamless authentication experience for users. This feature uses the user’s SSO session token if it is active, or will prompt for a new authentication with your identity provider if no active session is found.

A Zoom admin can enable this setting on the account's [security page](https://zoom.us/account/setting/security) under the **advanced** menu.

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXfEdymeE4sK16jjdIFscCwWJFRXrCOOa_JUC8l0P7qxR3mXD4HFeDP9V3SUEsJCFMFqn41oKdwmS2Rk7Ilu-NgPfaPj0IpVnYxYUCPYdtcVCU63p7GfceHm5GrhvgdFEPC67hpP?key=ug1dFE_WGWGnyMfD5tJnNw" alt=""><figcaption><p>Example of admin setting for SSO with Outlook add-in.</p></figcaption></figure>

### SAML Response Mapping

SAML attributes are categories of data defined by SAML values, and are used to pass information from the identity provider to a service provider like Zoom. Mapping attributes and values is essential for automating user profile information and managing user licenses.

SAML response mapping is broken into two halves: *basic* and *advanced*. Basic mapping is used to map basic profile information, including name, phone number, department, etc. Advanced mapping is used to manage dynamic license assignments, assigning user groups, user roles, and more.

This section covers the fundamentals of SAML response mapping, basic and advanced SAML response mapping, and highlights unique conditions required for some features.

#### <mark style="color:blue;">Fundamentals: SAML Attributes and Values</mark>

Most identity providers pass basic profile information using plain attribute names and values. For example, an employee’s department may come through SAML with an attribute of department and a value of Human Resources. The following table demonstrates the relationship between attributes and values when passing information on a user.

| SAML Attribute | SAML Value                     |
| -------------- | ------------------------------ |
| firstName      | John                           |
| lastName       | Smith                          |
| email          | <john.smith@companydomain.com> |
| department     | Human Resources                |

By correctly assigning a SAML attribute to a response mapping, user information can be automatically applied to a user profile to simplify the account creation and management process.

#### <mark style="color:blue;">Basic Mapping: Profile Information</mark>

SAML Basic Information Mapping is used to apply profile information like first name, last name, department, phone number, cost center, and location from a directory to a user’s profile. Many of these categories are self-explanatory and can be easily configured; however, some categories require explanation for proper configuration to prevent unanticipated consequences or application errors. The following section highlights unique mapping options and configuration settings for basic mapping. Refer to our [Basic SAML Mapping article](https://support.zoom.us/hc/en-us/articles/115005888686-Setting-up-basic-SAML-mapping) for a complete list of supported attributes.

#### <mark style="color:blue;">Default license type only applies to</mark> *<mark style="color:blue;">brand new users</mark>*

The default license type option will apply the designated license to all *brand new* users that are provisioned within the account through SAML. This does not apply to users that are authenticating for a second time, users that have consolidated into the account from a previous account, users that are provisioned through SCIM, or users that have been manually invited.

For information on *updating* user licenses with authentication, refer to the license configuration under [Advanced SAML Mapping](#advanced-mapping-licenses-add-ons-and-access).

#### <mark style="color:blue;">A default license type of</mark> *<mark style="color:blue;">None</mark>* <mark style="color:blue;">will not allow new users to authenticate unless advanced mapping is configured to assign a license</mark>

Zoom users must have an assigned license type (Basic, Licensed, or On-Prem) to login to the Zoom service. If a default license type of None is selected, new users cannot sign in or create a new account unless they will receive a license through [Advanced SAML Mapping](#advanced-mapping-licenses-add-ons-and-access).

#### <mark style="color:blue;">Most basic mappings will re-apply on login, unless otherwise specified</mark>

Most basic SAML mappings will update every time a user signs in by default, *except* *for* first name, last name, display name, and phone number. By default, these four mappings will only apply the first time a user authenticates and will not re-apply again, even if updated by a user or admin. Zoom administrators can change this behavior by enabling the option for **Update at each SSO login** on the SAML response mapping page.

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdgxB7nSeT9EXKL47NDJoqfiLnUAkydR2-yPdvgvQW178LJscVd-Jo8TfyuPBb2sez6c5cRwwK0FwoEhCwG8TlOfZV1MzpWoZxXOYHu1WCcPZYBryituG7Fyq-T88isb7-ofUn_MQ?key=ug1dFE_WGWGnyMfD5tJnNw" alt=""><figcaption><p>Example of Update at each SSO login option.</p></figcaption></figure>

#### <mark style="color:blue;">Phone number mappings should include a country code and area code if outside the United States</mark>

Phone numbers mapped through SAML should include the user’s country code and area code in the SAML assertion when possible. Zoom will assume a country code of +1 if not defined by default.

Accounts that do not retain country codes within their directory can edit their SAML assertions within their identity provider to automatically include these if necessary.

#### <mark style="color:blue;">Each user can have up to three phone numbers and one fax number mapped to their profile</mark>

Zoom administrators can configure up to three separate phone numbers and one fax number mapping for each user. Each phone number must be unique and cannot duplicate the value of another field.

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdYCqP1aO_ELJdgruJRApKiNSEQ96i1dThBbMwG0rH-XT4P64DcgadLpi_4dFm4tybOmAkUaH22Jg0Qs6WMhyanQ7FrFSHu7DFMJv6FzABVhdz6NvN_E0pX26mymjGHe5UjUcxRNg?key=ug1dFE_WGWGnyMfD5tJnNw" alt="" width="563"><figcaption><p>Example of phone number options for each user.</p></figcaption></figure>

#### <mark style="color:blue;">Profile pictures must be mapped from either a publicly accessible URL or encoded with Base64</mark>

Accounts that want to map profile pictures from their directory must map the images using either a publicly-accessible URL or encode the image in Base64 when asserting.

#### Employee Unique ID

<mark style="color:blue;">**The Employee Unique ID changes the primary identifier Zoom uses to identify users**</mark>

The *Employee Unique ID* is a feature Zoom offers to assist with identity management. By default, the primary identification for a Zoom user is their **email** **address**. This means that if the work email login type is **<john.smith@company.com>**, then Zoom will always identify this user by that e-mail address. This identifier is what allows integrations like SSO or Facebook and Google OAuth accounts to associate the user with the same Zoom account.

However, this identification process can be problematic if a user’s name or email changes. For example, if **<john.smith@company.com>** has an email change to **<jonathan.smith@company.com>**, Zoom cannot safely determine these are the same person (because the fundamental identifier is different) so Zoom will create a new account the first time **<jonathan.smith@company.com>** logs in.

To simplify this issue, Zoom offers the Unique Employee ID feature, which changes the primary identifier of a user from their email address to an established unique ID. *This does not change a user’s Zoom username*, but instead offers an alternative identifying attribute. This change allows Zoom to dynamically update a user’s email address within Zoom if:

* a *new* email address is accompanied by a known Unique Employee ID; and
* the affected user’s email domain is associated within Zoom

For example, if **<john.smith@company.com>** authenticates and passes a SAML value of 12345 (their employee number) for the Employee Unique ID attribute, Zoom will now identify the user within the account by the asserted value. If John authenticates again using the email **<jonathan.smith@company.com>** while still passing the Employee Unique ID of 12345, Zoom will identify that <john.smith@company.com> is now **<jonathan.smith@company.com>** and will dynamically update the user’s email within the account if the domain is associated.

Identity administrators should be *positive* that no two users will overlap with the same Employee Unique ID value before establishing SAML mapping for this category. If another user authenticates and passes the same value, the email will update again to the new user and can cause significant disruption to user services and experience.

<mark style="color:blue;">**The Employee Unique ID feature requires associated domains to change a user’s email**</mark>

The Employee Unique ID feature cannot update a user’s email address unless the email domain is officially associated with your account profile. Refer to our support article on [Associated Domains](https://support.zoom.us/hc/en-us/articles/203395207) for more information.

<mark style="color:blue;">**Admins and Owners cannot update their email through the Employee Unique ID**</mark>

Admin and owner emails within Zoom cannot be updated through the Employee Unique ID feature. This is intended as a security measure to prevent unauthorized access. Admins and owners must change their email through their profile page.

<mark style="color:blue;">**User emails can only be updated once per day through the Employee Unique ID**</mark>

User emails can only be updated once every 24 hours through the Employee Unique ID feature. A user must wait a full calendar day from the previous update before updating their email through SSO again.

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXct3ljK0YW8k8R82DXpS2__Hf8KB0qkleCQ_il6l4GcgeuhekPfPn55csfETIAauFfPQkmW7VBQOTDd2C9o39lzcTWDnMXZMW9FixnWOhCxraDttTdnKbXXF4aU1TrSOrh-9U388A?key=ug1dFE_WGWGnyMfD5tJnNw" alt=""><figcaption><p>Diagram of an example flow for updating user emails.</p></figcaption></figure>

<mark style="color:blue;">**Setting the SAML attribute to \<NameID> will use the asserted NameID of the user**</mark>

Mapping the Employee Unique ID SAML attribute to **\<NameID>** will automatically use the asserted NameID value of the user as their unique identifier. This can be a beneficial tool if your identity provider asserts a NameID other than a user’s email, like a User Principal Name (UPN) or similar value that does not change. Do not use this value if users’ NameIDs match their email.

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXfc-LwwficUxnJVa6raeHY3XwO_bRUnOo3Px-FpVWxCXKTEVRI2zoCRbp9Mjzsj1gyiTVmPy-gHryvIjpBuxrM8Me38KvWu0gf-mrPrnwxnaK9tk_hsywxF25Slq3Yh99iKINVPmw?key=ug1dFE_WGWGnyMfD5tJnNw" alt=""><figcaption><p>Example of the &#x3C;NameID> admin setting.</p></figcaption></figure>

### Advanced Mapping: Licenses, Add-ons, and Access

The SAML Advanced Information Mapping section can dynamically apply licenses (including Zoom Phone), add-ons, and user access groups to users as they authenticate. Unlike basic mapping, advanced mapping contains many nuances that can require diligent attention when configuring, depending on the complexity of your environment. This section highlights the nuances for configuring advanced SAML mapping. Refer to our [Advanced SAML Mapping article](https://support.zoom.us/hc/en-us/articles/115005081403-Setting-up-advanced-SAML-mapping) for a complete list of supported attributes.

#### <mark style="color:blue;">Advanced mapping applies every time a user authenticates</mark>

Unlike basic mapping, which has optional updates for some categories, advanced mapping configurations will apply every time a user authenticates, according to the top-down order of application.

For example, if a user has a basic license and then authenticates through SSO passing a SAML attribute and value mapped to granting a full license, the user will be instantly granted the full license. If the user’s profile is then changed within the identity provider to move them back to a basic license, they will be re-assigned the basic license once they reauthenticate within Zoom.

#### <mark style="color:blue;">Advanced mapping allows multiple SAML attributes and values per category</mark>

Unlike basic mapping, which allows only one SAML attribute per category, advanced mapping can support multiple attributes and values for each category. This allows for significant flexibility when managing user licensing and access through security groups within your identity provider as seen in the following configuration.

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXcw0QbtEMEhc4KtDF3LZsfAIgir_-AB2XGFaJ6qWplazLgxbyRSunevolbVjRFe196QBnWeqwA8dPSnvGbyhg-TSH1yJ2iZvElnIDPU6j1wRuka_5MndC3rAjXADRJIqPmoeESo?key=ug1dFE_WGWGnyMfD5tJnNw" alt=""><figcaption><p>Example attribute mapping for SAML.</p></figcaption></figure>

{% hint style="success" %}
**Zoom Tip**

SAML attributes can vary by identity provider, notably for security groups. Confirm with your identity provider or through [SAML response logs](#response-logs-tell-you-which-saml-values-and-attributes-are-being-asserted) how SAML attributes are asserted.
{% endhint %}

#### <mark style="color:blue;">Advanced mapping applies licenses from the top-down when multiple attributes are asserted</mark>

If a user passes multiple SAML attributes or values that are configured for advanced SAML mapping, Zoom will map the licenses from the top-down. See the following example:

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXd6ejdpzRIK8EUzyzdyomoHNChq-XkoS85btacDjLOAKyBQVwIQ15dzUKqsE_l8iFDOJiYGUjh4W7XaTRapGaZp5tx7R2J06yvpbwSna1YVjR9_ms8nn1haaJiNxaaL6wQ7XdC1QA?key=ug1dFE_WGWGnyMfD5tJnNw" alt=""><figcaption><p>Example license type selection in admin settings.</p></figcaption></figure>

According to the above configuration, if a user were to pass an attribute for both **global\_users** and **marketing**, because **marketing** is the highest in the configuration, this attribute will be applied to the user, and the remaining applicable attributes will be ignored.

Alternatively, if the configuration was set with **global\_users** as the highest, as seen in the following screenshot, if a user’s assertion contained **global\_users**, **marketing**, **human** **resources**, and **IT**, because **global\_users** is the highest priority, only a basic license will be asserted.

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXfdQrc0QA5GFNzFVBIa9y1HH0GdkDMzeSomo4GdhE8xHCQzwozv2CXWRkdedXemhuAoZ81rfa21kPlO_0DalY2oasz6XDJkLD88NaNQiH686EX9Rfuxb-mje5go5uep9Fp3RBQuKw?key=ug1dFE_WGWGnyMfD5tJnNw" alt=""><figcaption><p>Example of adjusting the order of priority</p></figcaption></figure>

Zoom administrators can adjust the order of application when editing the mapping values using the ↑↓ arrows within the editor.

{% hint style="success" %}
**Zoom Recommendation**

Configure the advanced configurations from the most specific to most general to prevent license misapplication.
{% endhint %}

#### <mark style="color:blue;">Webinar and Large Meeting mappings can share a common value to apply both add-ons</mark>

To simplify the application process, Zoom administrators can configure the same SAML attribute and value twice to apply both webinar and large meeting add-ons to the users, as seen in the following image with the **global\_users** value. These add-ons can also be independently configured if desired, as shown with the **webinar\_only** and **large\_meeting\_only** values.

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdY6Py9Rb7L7iKsez3UXpg9ZwL-gxgmpO5QjLDXdeZC42EJDCHEw82ghcAm4m5Rb8fZ8GQvT5rd47j-p4JeR6DUUAujw7ARMynCsLKPLrJVGjlkiEp2YtRk-sOZNaQPUQWYRRTsmQ?key=ug1dFE_WGWGnyMfD5tJnNw" alt=""><figcaption><p>Example of SAML attributes for large_meeting_only and webinar_only.</p></figcaption></figure>

#### <mark style="color:blue;">Users can be added to multiple User Groups using one SAML value</mark>

Zoom Administrators can configure User Group mapping to add a user to multiple groups with one SAML value.

The first user group added will be set as the user’s Primary Group and will determine the user’s default settings *unless an underlying group has a setting locked*. For more information on User Groups refer to our [support article](https://support.zoom.us/hc/en-us/articles/204519819-Managing-user-groups-and-settings).

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdER0NnN7GSalp5YpVpM9EW068VLrDgdHOJty4Hm6blWIOEghH5Woj7B8s7io1X2U3ywZEiyvU5cJE4pEcCJtSrlhAsaPnzLK44CVAlU_k1Igqt4y8ejYfFAw-ILkKulqXUGqohrg?key=ug1dFE_WGWGnyMfD5tJnNw" alt=""><figcaption><p>Example of multiple User Group mapping.</p></figcaption></figure>

#### <mark style="color:blue;">Specified users and User Groups can be exempt from specific SAML mappings</mark>

Every option under Advanced SAML Mapping can be configured to exempt specific users and User Groups from mapping behavior. This can be beneficial for preventing VIP users from service disruption due to a potential change in licensing.

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXftnv80dtlXFIYqMKvlB0mecwcoX7_IEQIFXed3x-9szHtQv3X-h_aLv5gkJ4_9q0wIJI3YlxNdPS3aR--_TOt3Xv8_ZGfv2Fqrv9hSSAEvaY4e69nEPQIpVGHMk6fTbKareeawww?key=ug1dFE_WGWGnyMfD5tJnNw" alt=""><figcaption><p>Example of user exemptions.</p></figcaption></figure>

#### <mark style="color:blue;">Auto Mapping automatically assigns users to a User, Channel, or IM group named after their asserted SAML value if the value is not previously mapped to a group</mark>

Auto Mapping can be used to automatically assign users to a User Group, Channel, and IM Group named after their asserted SAML value. Unlike other advanced mapping components, which can be configured to assign a user to any group based on the SAML value, Auto Mapping always assigns a user to a group based on the exact SAML value. If the group previously did not exist, it will be automatically created.

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXcleVut-f8Pq1AdmwMk0CU5uE4MYhIFAdSPSxxVbyoMyS2e24V3RL9AD_VhcVCTtoh0PFswB_8JTwlOMYm_TCTKria2nIAOVtg7iI3rlKdsWAwpe5UlM-AfuthKuAnG8_mu71VPcw?key=ug1dFE_WGWGnyMfD5tJnNw" alt=""><figcaption><p>Example od SAML Auto Mapping.</p></figcaption></figure>

For example, if Auto Mapping is set to map a user into the groups based on their department, if their department value is not already defined for the User Group, Channel, or IM Group, users will be automatically assigned into a group that matches their department name, as shown in the following table:

| SAML Attribute | SAML Value      | Does Zoom Group already exist? | Result                                            |
| -------------- | --------------- | ------------------------------ | ------------------------------------------------- |
| Department     | Human Resources | Yes                            | User added to Human Resources group               |
| Department     | Marketing       | Yes                            | User added to Marketing group                     |
| Department     | Sales           | No                             | Sales group is created, user added to Sales group |

#### Zoom supports up to five custom SAML attributes

Zoom administrators can configure up to *five* custom SAML attributes for adding user data to their Zoom profile under the [advanced user management](https://zoom.us/account/user#/advanced) page. After adding the custom fields, Zoom Administrators can configure the mapping on the [SAML Response Mapping](https://zoom.us/account/sso/mapping) page.

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXcxmWWYpKRYP078q0iwYdK9tfmcmAHLuwZtoSn7VoUeeRbdki2udbiF0Yh7pUczEG_rXqZGS1zBbDl4-OODAZYMFEkISb4L55mahN_6hAqt87dCo8fT4Yj7aQVw1ivuZtzksdmhQg?key=ug1dFE_WGWGnyMfD5tJnNw" alt="" width="563"><figcaption><p>Example of Custom SAML Attributes</p></figcaption></figure>

#### <mark style="color:blue;">Mapping users to a sub-account will</mark> *<mark style="color:blue;">only</mark>* <mark style="color:blue;">apply a meeting license and add-ons</mark>

Mapping a user to a sub-account will only apply a user’s meeting license and add-ons like Webinar and Large Meetings to the sub-account. User Groups, IM Groups, User Roles, etc., will not apply and must be configured within the sub-account.

Customers that require more flexibility for SAML response mapping with sub-accounts will require a unique Vanity URL and new SSO configuration within the sub-account.

### Troubleshooting SSO

#### <mark style="color:blue;">Using SAML Response Logs to Troubleshoot</mark>

Saved SAML response logs can be an invaluable tool for troubleshooting configuration and user errors, in addition to SAML response mapping configurations. If your SSO configuration is set to save SAML response logs, they can be accessed through the [SAML Response Log](https://zoom.us/account/sso/saml_logs) tab available within the SSO configuration page in Advanced Settings. To view SAML response logs, click **View Details** next to an authentication attempt.

#### <mark style="color:blue;">Most authentications will display in the response logs</mark>

Most failed or unsuccessful authentication attempts will display on the response logs page. If an authentication attempt does not display, it is most likely Zoom did not receive a SAML assertion from your identity provider, or saving SAML response logs is disabled.

#### <mark style="color:blue;">Response logs can tell you if your configuration is incorrect or your certificate is outdated</mark>

When SAML response logs are enabled, the identity provider’s information is asserted to Zoom to authenticate identities for each party. If an asserted setting or string of information, like the X509 certificate or issuer ID is different from Zoom’s current configuration, an error will appear advising that the information “does not match the current SSO Settings.” A Zoom administrator can update the SSO configuration to match these asserted values if they are correct to resolve the error.

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXe5ElE9oAkqrfuutEG32SjtnF-aPpSu_MbRIy3h6oRhTiHnBC3okBRHk57sWwuJgg3a8_WD_mYoK_Wd5bJ1zMkLScazjdXshmBUZyXvBVtmyQO75Rl7ox_MCgT6X-AzcA?key=ug1dFE_WGWGnyMfD5tJnNw" alt=""><figcaption><p>Example of incorrect configuration warnings.</p></figcaption></figure>

#### <mark style="color:blue;">Response logs tell you which SAML values and attributes are being asserted</mark>

Reviewing response logs can assist with resolving SAML response mapping configurations by verifying what attributes and values are being asserted by users as they authenticate. These can be compared to the configuration to ensure the attributes and values match.

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXe-BD98pFvpYplXC-sVB4KKlUFDc0dOzjv-VzEOyH5tOBQbt-yiK8e82nkLGC7FmBJIekP-VVqEBVnullP173ydJLkNDFh6nCcOfup1UHlTTYl2l0DDitymKeid4NO7ZZYaw6J3sQ?key=ug1dFE_WGWGnyMfD5tJnNw" alt=""><figcaption><p>Example of information being asserted by the identity provider service.</p></figcaption></figure>

If SAML attributes or values are missing, the information is not being asserted by the identity provider service. Users experiencing this issue are encouraged to reach out to their identity provider support services for more assistance.

#### <mark style="color:blue;">Response Logs include an error code and brief explanation, if unsuccessful</mark>

If a user cannot authenticate or receives an error, the SAML response logs contain an error code and brief explanation of the error.

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXcUxXpQNQM4ZUpgIHUF2s__t4s3fM4sjWqXqv5y4i4oop4ygRKYcxxdeC7pIX7_O8sgxFmbrkPd6PrlLam4zptYZNKleBKEXFEUd0o97IvJZvRfZi81sSfKr6wwvfxemuzg_UDi?key=ug1dFE_WGWGnyMfD5tJnNw" alt=""><figcaption><p>Example error code and explanation.</p></figcaption></figure>

Most issues can be identified and resolved by using these error messages. If you cannot resolve the error, reach out to Zoom Support for additional assistance.

#### <mark style="color:blue;">Web Tracking ID Errors</mark>

If a user fails SSO authentication, they will receive a WEB Tracking ID error code. These codes are not an error message related to a specific failure, but are instead a unique log ID that can be reviewed in SAML Response Mapping for identifying authentication issues.

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdg3Btc3wYZ71fAL7VX5G0OiLOQ-YKOAmt1-fytPE2xDRktbVLQqw_r2rURYLExtZ2rSfIIqelDEM8oZ47-gFBKdn2Ze9V6kx5nB_kuxZlYIKP2Hy24Ot0SXrobSdLg4BfudOs_?key=ug1dFE_WGWGnyMfD5tJnNw" alt=""><figcaption><p>Example of a user-facing error with a WEB Tracking ID error code.</p></figcaption></figure>

To identify the error, if SAML response logging is enabled, navigate to the [SAML Response Log](https://zoom.us/account/sso/saml_logs) tab available within the SSO configuration page in Advanced Settings. From there, enter the WEB tracking ID into the Tracking ID field and search to populate the response log

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXcbDm_F5qgN7TwBk0PiItomqHcaoFUFU8VAmTECFtzogW1sjvlJiIYaK2pXniGKDIEUnEZOg1-xHYrpteg6foFyec_SlpRVjqjUmrNa1lbPvdCEwnuZtOU1yvqfuGYh-enXmq5f?key=ug1dFE_WGWGnyMfD5tJnNw" alt=""><figcaption><p>Example of searching the SAML Response Log with the aforementioned WEB Tracking ID error code.</p></figcaption></figure>

The SAML response logs should display the SAML assertion and an error code and message at the bottom of the response that can be used for additional troubleshooting.

### SCIM Errors

#### <mark style="color:blue;">User Not Exist or Not Belong to this Account</mark>

This error occurs when a targeted user’s email address fails to provision due to an already existing account. Zoom administrators are encouraged to reach out to the user directly and manually invite the user to the account.

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdXyiyMnR4S4EhYFqFUXgrePk-RwciKw8-jcxKxViZiIZ4I2kp0j1f_alWR7Hq9WuYhwz6ohh4LodWERfiXSr27LFN20r-r95xBJ6AjD7lF9k58yIJeYLpMmHR3BHYcPTMYkVwqZw?key=ug1dFE_WGWGnyMfD5tJnNw" alt=""><figcaption><p>Example of a provisioning error.</p></figcaption></figure>

#### <mark style="color:blue;">You Can’t Add Paid Users</mark>

This error occurs when SCIM attempts to provision a user when there are inadequate licenses on the account. To resolve the error, the user must be provisioned as a basic user, or a license must be made available for provisioning.

### Using SCIM Logs to Troubleshoot User Provisioning

Zoom provides the most recent 100 API request logs in the [Zoom Marketplace](https://marketplace.zoom.us/). A Zoom administrator can use these logs to confirm what information is being sent and received through provisioning APIs. To access the logs, sign into the Zoom Marketplace as a Zoom administrator and click **Manage**. On the following page, select **Call Logs** under **Personal App Management**. From there, click an entry to expand the API logs and review the contents.

The following image shows an example of a SCIM user provisioning request, with the user’s identity and licensing attributes highlighted for reference.

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXcIxosFPBR8E4f1hj0vZQ7_nxnRd_isIqJYhKTQbocw4UfXlCBCkscqx8bGvY8JwuazgtRROPJm9PCZfZ4hJ5GQBqBzJA-PgS-mXkptGa0xq82SMXjl9Ip-faCDk3OQuLUXK0iobQ?key=ug1dFE_WGWGnyMfD5tJnNw" alt=""><figcaption><p>Example of a SCIM user provisioning request.</p></figcaption></figure>

Like SAML response mapping, Zoom can only apply information that is submitted from the identity provider in the provisioning request. Use these logs to confirm that user identity and licensing attributes are being submitted from the identity provider. If expected information is missing from these assertions, contact your identity provider for support.

### Data Flows and Authentication

#### <mark style="color:blue;">SAML Authentication</mark>

The following diagram details a user’s SAML authentication flow when initiating a single sign-on session with Zoom.

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXfkEMRTb806bc8m6p0o2PoRatl-YUcolK_42gs9cSFWW10jHIeMvgjn7uLfItLOKYtg4Ps97WAUWRgHXmSc0oF8kgDBXwqYdnDt1aZhxIXgyoUJa-M6gxtRMiMPxW8pGek27TNw?key=ug1dFE_WGWGnyMfD5tJnNw" alt=""><figcaption><p>Diagram of an example SAML authentication flow.</p></figcaption></figure>

#### <mark style="color:blue;">SSO Web Login Token</mark>

After a user authenticates through SAML, the user's session is built within their browser, and has

a life of two hours by default. If the user continues to actively use their Zoom web page, the session will refresh; however, if the user does not use their web page for two hours, the token will expire and the user must reauthenticate. Zoom admins can configure this active session length on the [Security](https://zoom.us/account/setting/security) page under Users need to sign in again after a period of inactivity and **Set period for inactivity on the web (minutes)**.

#### <mark style="color:blue;">Client Login Token</mark>

When a user attempts to authenticate via SSO within a client, the user’s machine will open a web browser and redirect them to the identity provider’s login page. After a user authenticates, the user’s browser will receive a Zoom client launch token. Once a user clicks the “open” or “launch” button, the browser uses the URL schema combined with the launch token to open the Zoom client.

The Zoom client will use the launch token to obtain the access token and the refresh token from Zoom server. The client will use the access token for a length of two hours at a time, and upon expiration will use the refresh token to gain a new set of tokens, which are stored within the client’s local database. This refresh process is unlimited by default, and can continually cycle through tokens until a user signs out or the tokens expire. Zoom administrators can customize the session length on the [SSO settings](https://zoom.us/account/sso) page under [*enforce automatic logout*](#zoom-administrators-can-enforce-automatic-logout-after-a-defined-length-of-time).
