Steps to configure SAML SSO for Aha!

About Aha!

Aha! is a leading product development software platform designed to help teams turn their product strategies into actionable plans. It offers a suite of tools—including Aha! Roadmaps, Ideas, Whiteboards, Discovery, Knowledge, and Develop—that support the entire product life cycle from initial concept to final delivery.

The following steps will help you enable SSO for Aha! from Identity360.

Prerequisites

  1. The MFA and SSO license for Identity360 is required to enable SSO for enterprise applications.
  2. Log in to Identity360 as an Admin, Super Admin, or Technician with a role that has Application Integration and Single Sign-on permissions.
  3. Navigate to Applications > Application Integration > Create New Application, and select Aha! from the applications displayed.
    Note: You can also find Aha! from the search bar located at the top.
  4. Under the General Settings tab, enter the Application Name and Description.
  5. Under the Choose Capabilities tab, select SSO and click Continue.
    Identity360 application configuration General SettingsGeneral Settings of SSO configuration for Aha!
  6. Under Integration Settings, navigate to the Single Sign On tab, click Metadata Details. Copy the Logout URL value and save the Metadata file by clicking Download. These details will be used later during the configuration of Aha!
    Identity360 application configuration Integration SettingsIntegration Settings of SSO configuration for Aha!

Aha! (service provider) configuration steps

  1. Login to Aha! with an administrator’s credentials.
  2. Navigate to Settings icon → AccountSecurity and single sign-on.
  3. From the Single sign-on section, choose SAML 2.0 Provider from the Identity provider dropdown.
  4. Name your configuration.
  5. Choose the Metadata file radio button.
  6. Click Choose file and upload the Metadata file downloaded in step 6 of prerequisites.
  7. Select Certificate fingerprint algorithm as SHA1 from the drop-down.
  8. In the Logout redirect URL field, paste the Logout URL copied in step 6 of prerequisites.
  9. Copy the SAML entity ID value, which will be used during Identity360 configuration.
  10. Click Enable to save the configuration.
    SAML configuration of AhaSAML configuration of Aha!

Identity360 (identity provider) configuration steps

  1. Switch to Identity360's application configuration page.
  2. Enter the SP Identifier of your Aha! account. Paste the SP identifier value from the SAML entity ID copied in step 9 of Aha! configuration. For example, if https://fetch-feel-kind.aha.io/ is your SAML entity ID, then fetch-feel-kind is your SP identifier.
  3. Enter the Relay State parameter, if necessary.
    Note: Relay State is an optional parameter used with a SAML message to remember where you were or to direct you to a specific page after logging in.
  4. Click Save.
    Identity360 application configurationIntegration Settings of SSO configuration for Aha!
  5. To learn how to assign users or groups to one or more applications, refer to this page.

Your users will now be able to sign in to Aha! through the Identity360 portal.

Note: For Aha!, both SP-initiated and IdP-initiated flows are supported.

Steps to enable MFA for Aha!

Setting up MFA for Aha! using Identity360 involves the following steps:

  1. Set up one or more authenticators for identity verification when users attempt to log in to Aha!. Identity360 supports various authenticators, including Google Authenticator, Zoho OneAuth, and email-based verification codes. Click here for steps to set up the different authenticators.
  2. Integrate Aha! with Identity360 by configuring SSO using the steps listed here.
  3. Now, activate MFA for Aha! by following the steps mentioned here.

How does MFA for applications work in Identity360?

  SSO Integration flow diagram  

Don't see what you're looking for?

  •  

    Visit our community  

    Post your questions in the forum.

     
  •  

    Request additional resources  

    Send us your requirements.