Steps to configure SAML SSO for Wrike

About Wrike

Wrike is a cloud-based project management platform designed for both large enterprises and small- to medium-sized businesses. Wrike offers a comprehensive suite of tools, including Gantt charts, calendars, workload views, and custom dashboards, enabling teams to manage projects, deadlines, and workflows effectively.

The following steps will help you enable single sign-on (SSO) for Wrike from Identity360.

Prerequisites

  1. The MFA and SSO license for Identity360 is required to enable SSO for enterprise applications.
  2. Log in to Identity360 as an Admin or Super Admin.
  3. Navigate to Applications > Application Integration > Create New Application, and select Wrike from the applications displayed.
    Note: You can also find Wrike from the search bar located at the top.
  4. Under the General Settings tab, enter the Application Name and Description.
  5. Under the Choose Capabilities tab, choose SSO and click Continue.
    Identity360 application configuration General SettingsGeneral Settings of SSO configuration for Wrike.
  6. Under Integration Settings, navigate to the Single Sign On tab and click Metadata Details. Copy the Metadata value, which will be used later during the configuration of Wrike.
    Identity360 application configuration Integration SettingsIntegration Settings of SSO configuration for Wrike.

Wrike (service provider) configuration steps

  1. Log in to Wrike with admin privileges.
  2. Click your profile icon and click Settings.
    Wrike portal viewPortal view of Wrike.
  3. Navigate to Security and click Setup SAML SSO.
    Wrike security settingsSecurity settings of Wrike.
  4. From the Set up your Identity Provider section, choose the Other drop-down. Click Next.
    Wrike IdP selection for SSO setupIdentity provider selection for SSO setup for Wrike.
  5. From Wrike's metadata file section, click Next.
    Wrike metadataWrike metadata.
  6. Under the IDP metadata section, select the Enter XML radio button and paste the metadata value copied in step 6 of the prerequisites. Click Next.
    IDP metadata configuration in WrikeIdentity provider metadata configuration in Wrike.
  7. Next, click Enable SAML settings.
    Enabling SAML settings in WrikeEnabling SAML settings in Wrike.
  8. An email will be sent to you with a code to confirm the implementation of SSO. Enter the code and click Confirm.
    Email verification from WrikeEmail verification from Wrike.
  9. Click Save SAML settings.
    Save SAML settings in WrikeSAML settings saved in Wrike.

Identity360 (identity provider) configuration steps

  1. Switch to Identity360's application configuration page.
  2. Enter the Relay State parameter, if necessary.
    Note: Relay State is an optional parameter used with a SAML message to remember where you were or to direct you to a specific page after logging in.
  3. Click Save.
    Identity360 application configurationIntegration Settings of SSO configuration for Wrike.
  4. To learn how to assign users or groups to one or more applications, refer to this page.

Your users will now be able to sign in to Wrike through the Identity360 portal.

Note: For Wrike, both SP-initiated and IdP-initiated flows are supported.

Steps to enable MFA for Wrike

Setting up MFA for Wrike using Identity360 involves the following steps:

  1. Set up one or more authenticators for identity verification when users attempt to log in to Wrike. Identity360 supports various authenticators, including Google Authenticator, Zoho OneAuth, and email-based verification codes. Click here for steps to set up the different authenticators.
  2. Integrate Wrike with Identity360 by configuring SSO using the steps listed here.
  3. Now, activate MFA for Wrike by following the steps mentioned here.

How does MFA for applications work in Identity360?

  SSO Integration flow diagram  

Don't see what you're looking for?

  •  

    Visit our community  

    Post your questions in the forum.

     
  •  

    Request additional resources  

    Send us your requirements.

     
Back to Top