All Products
Search
Document Center

Secure Access Service Edge:Connect to an IDaaS identity provider

Last Updated:Mar 31, 2026

Connect your company's IDaaS (Identity as a Service) identity provider to SASE so employees can log on to the SASE App with their existing corporate accounts. Once connected, you can issue security policies based on your organizational structure without re-creating identity data in SASE.

Prerequisites

Before you begin, ensure that you have:

  • Access to the SASE console

  • Admin access to your IDaaS instance (new or old version)

  • The SAML metadata file exported from your IDaaS instance

Limitations

  • Up to 5 identity providers can be enabled at the same time

  • Only 1 custom identity provider can be enabled at a time

If you've reached the limit, disable an existing identity provider before enabling a new one.

Connect an IDaaS identity provider

  1. Log on to the SASE console.

  2. In the left navigation pane, choose Identity Authentication > Identity Access.

  3. On the Identity synchronization tab, click Create IdP.

  4. In the Create IdP panel, select IDaaS, then click Configure.

  5. Follow the configuration wizard based on your IDaaS version:

New version IDaaS configuration

Step 1: Basic configurations

Configure the following parameters in the Basic Configurations step.

ParameterDescription
IdP NameA name for this identity provider configuration. Must be 2–100 characters. Allowed characters: Chinese characters, letters, digits, hyphens (-), and underscores (_).
DescriptionA description that appears as the logon title in the SASE client. Helps users identify the provider at login.
IdP StatusThe initial status after creation. Enabled: the identity source is active immediately. Closed: the identity source is inactive.
Important

Disabling an identity source prevents employees from accessing internal applications via the SASE App.

IDaaS versionSelect New Version.
Regional instanceThe region where your IDaaS instance is located. Select Chinese Mainland or Outside Chinese Mainland.
SAML Metadata FileUpload the SAML metadata file. This file is auto-generated by IDaaS when you create an Alibaba Cloud SASE application on the Single Sign-on tab in the IDaaS console.
Grant Read Permissions on Organizational StructureWhether to allow SASE to read your org structure for policy management. Set to Yes to enable batch security policy issuance based on departments. Set to No to skip org sync.
LOGO(Optional) Upload a custom logo.

If you set Grant Read Permissions on Organizational Structure to Yes, fill in the following API fields. These values are auto-generated by IDaaS when you set up the SASE application.

FieldWhere to find it in IDaaS
Instance IDThe ID of your EIAM (Employee Identity and Access Management) instance
Application IDThe ID of the Alibaba Cloud SASE application you added to the EIAM instance
client_idAuto-generated on the General Configurations tab
client_secretAuto-generated on the General Configurations tab
Public Key EndpointAuto-generated on the Account Synchronization tab
Encryption/Decryption KeyAuto-generated on the Account Synchronization tab
URL for Receiving Synchronization RequestsCopy this URL from the SASE console and paste it into the sync reception address field in the IDaaS console
After configuration, SASE reads department structure only—not individual employee data—when issuing security policies.

Automatic synchronization settings (available when Grant Read Permissions is set to Yes):

SettingDescription
Automatic SynchronizationWhen enabled, SASE syncs org data from IDaaS automatically. When disabled, you must sync manually.
Synchronize User InformationWhen enabled, SASE automatically syncs employee data on the configured cycle. Requires Automatic Synchronization to be enabled.
Automatic Synchronization CycleHow often SASE syncs from IDaaS. Set to any interval between 1 and 24 hours.

Connectivity test: If you set Grant Read Permissions on Organizational Structure to Yes, click Connectivity Test before proceeding.

  • If the test succeeds: The connection to IDaaS is verified. Click Next to continue to synchronization settings.

  • If the test fails: Check your API credentials (Instance ID, Application ID, client_id, client_secret) and verify that the URL for Receiving Synchronization Requests is correctly pasted in the IDaaS console. Then retry.

If you set Grant Read Permissions on Organizational Structure to No, click Confirm to complete the configuration.

Step 2: Synchronization settings

Configure the org sync scope and field mapping, then click Confirm.

ParameterDescription
Organizational Structure SynchronizationSynchronize All: syncs the entire org structure from IDaaS. Partially Synchronize: select specific departments to sync.
Field Synchronization MappingMap IDaaS org fields to SASE fields. If the built-in Local Field After Mapping options don't meet your needs, click View Extended Fields in the upper-right corner to add, edit, or delete custom fields.

Old version IDaaS configuration

Basic configurations

Configure the following parameters.

ParameterDescription
IdP NameA name for this identity provider configuration. Must be 2–100 characters. Allowed characters: Chinese characters, letters, digits, hyphens (-), and underscores (_).
DescriptionA description that appears as the logon title in the SASE client. Helps users identify the provider at login.
IdP StatusThe initial status after creation. Enabled: the identity source is active immediately. Closed: the identity source is inactive.
Important

Disabling an identity source prevents employees from accessing internal applications via the SASE App.

IDaaS versionSelect Old Version.
SAML Metadata FileUpload the SAML metadata file. This file is auto-generated by IDaaS when you create the application details (SAML).
Grant Read Permissions on Organizational StructureWhether to allow SASE to read your org structure. Set to Yes to specify API key and automatic synchronization settings. Set to No to skip.
SP Entity IDStatic value: https://saml-csas.aliyuncs.com/saml/metadata (pre-filled, do not modify)
SP ACS URLStatic value: https://saml-csas.aliyuncs.com/saml/acs (pre-filled, do not modify)
LOGO(Optional) Upload a custom logo.

If you set Grant Read Permissions on Organizational Structure to Yes, configure the following:

FieldDescription
API KeyThe API Key for IDaaS authentication
API SecretThe API Secret for IDaaS authentication
Automatic SynchronizationWhen enabled, SASE syncs org data from IDaaS automatically. When disabled, you must sync manually.
Synchronize User InformationWhen enabled, SASE automatically syncs employee data on the configured cycle. Requires Automatic Synchronization to be enabled.
Automatic Synchronization CycleHow often SASE syncs from IDaaS. Set to any interval between 1 and 24 hours.
After configuration, SASE reads department structure only—not individual employee data—when issuing security policies.

Connectivity test: If you set Grant Read Permissions on Organizational Structure to Yes, click Connectivity Test to verify the connection.

  • If the test succeeds: Click Confirm to complete the configuration.

  • If the test fails: Check your API Key and API Secret, then retry.

If you set Grant Read Permissions on Organizational Structure to No, click Confirm to complete the configuration.

View synchronization records

After automatic synchronization completes, review the results to confirm the org data synced correctly.

  1. On the Identity synchronization tab, find the identity source and click Synchronize Records in the Actions column.

  2. On the Synchronize Records page, the left panel lists individual sync tasks under Synchronization Task. Click a task to see its details on the right.

    image

  3. Click Details in the Actions column to compare Third-party Data Source fields against SASE Data Source fields for a specific task.

After a successful sync, view the synced org structure and employee data at Identity Authentication > Identity Access > Employee Center. For more information, see Employee Center.

Manual synchronization

If automatic synchronization is disabled, or if your org structure has changed and you need an immediate update:

  1. On the Synchronize Records page, click Create Synchronization Task.

  2. Click OK and wait for the task to complete.

  3. Review the sync results in the task list.

Disable automatic synchronization

To stop automatic synchronization for an identity source, use either method:

  • On the Identity synchronization tab, find the identity source and turn off the switch in the Automatic Synchronization column.

  • Open the Edit IdP panel and turn off the automatic synchronization switch.

More operations

OperationSteps
Edit an IDaaS identity providerOn the Identity synchronization tab, find the provider and click Edit in the Actions column.
Disable an IDaaS identity providerOn the Identity synchronization tab, find the provider and turn off the switch in the IdP Status column.
Delete an IDaaS identity providerOn the Identity synchronization tab, find the provider and click Delete in the Actions column.

What's next