ManageEngine PAM360 supports Single Sign-On (SSO) using SAML 2.0, enabling seamless integration with Federated Identity Management Solutions. In addition to popular IdPs such as Okta, Microsoft Entra ID, ADFS, and Google, PAM360 offers native support for SAML-based SSO through Zoho Directory. In this setup, PAM360 functions as the Service Provider (SP) while Zoho Directory serves as the Identity Provider (IdP). Organizations can centralize the authentication process while ensuring compatibility with existing Federated Identity Management frameworks by leveraging Zoho Directory as the IdP. This simplifies user management, enhances security, and provides a hassle-free, single-login experience across applications. The integration process involves supplying details about SP to IdP and vice-versa.
Once the integration is complete, users only need to log in to Zoho Directory and access PAM360 directly from its GUI without re-entering their PAM360 credentials, enabling a streamlined and secure authentication experience. Additionally, the integration supports Single Logout (SLO), ensuring that when users log out from one application, they are automatically logged out from all connected applications, thereby maintaining secure and efficient user session management.
Caution
The administrator performing this configuration should possess the necessary permissions to add applications to the Zoho Directory and assign users to the applications.
This document covers the following topics in detail:
Follow these steps to seamlessly integrate PAM360 with Zoho Directory, enabling a smooth and secure SAML SSO experience.
To configure PAM360 as an SP in the Zoho Directory, you need SP details displayed in step 1 during the IdP configuration in PAM360. These details are necessary for setting up PAM360 as an SP on Zoho Directory, ensuring a seamless integration between PAM360 and Zoho Directory.
Follow these steps to add PAM360 as an application in the Zoho Directory portal.






| Credential Details | |||
|---|---|---|---|
| Username Scenarios in PAM360 | Name ID format | Application Username | Expression Value |
PAM360 username matches the email address provided in the Zoho directory | Email Address | Primary Email Address | None |
PAM360 username matches the Email ID prefix in the Zoho directory | Unspecified | Email ID Prefix | None |
PAM360 username matches the conjunction of First Name and Last Name in Zoho Directory. For example, if the first name is John, the last name is Doe, and the PAM360 username is John Doe | Unspecified | Custom | String.append(user.firstName, String.append(" ", user.lastName)) |
PAM360 username matches the First Name in Zoho Directory | Unspecified | Custom | String.append(user.firstName,"") |
PAM360 username matches the Last Name in Zoho Directory | Unspecified | Custom | String.append(user.lastName,"") |
If you have users imported from the Active Directory in your environment, then their username will be in the format Domain/Email ID Prefix | Unspecified | Custom | String.append("Domain name/", String.substring(user.email, 0, String.indexOf(user.email, "@"))) |

Caution
Follow these steps to assign Zoho directory users to the PAM360 application.



After configuring PAM360 as an SP in the Zoho Directory portal, you must configure Zoho Directory as an Identity Provider (IdP) in PAM360 to establish it as a trusted entity. Access the PAM360 browser window and proceed with the IdP configuration starting from Step 2 - Configure Identity Provider Details. Explore this link for the detailed IdP configuration steps. Based on the provided steps, configure Zoho Directory as an IdP and configure the SAML properties on the PAM360 interface.
Follow these steps to access the IdP details required to configure Zoho Directory as a trusted IdP on PAM360:

After successfully configuring SAML SSO, you can verify whether the single sign-on feature is working as intended in your environment. To validate if single sign-on works, click the Open App button beside the Test SSO button on the PAM360 integration window within the Zoho Directory portal.