product icon

Set Up a Custom Enterprise Sign-In Configuration

One of the options for implementing Enterprise Sign-In (single sign-on) is to set up a custom configuration using the Identity Provider tab within the Organization Center. This is most commonly used by companies that use a third-party provider that doesn't offer a pre-configured single sign-on package, or that need a custom SAML Identity Provider.

You should have already created your organization by verifying at least one (1) domain used by your company. If not, view Step #1 in Set up enterprise sign-in (SSO).

The Identity Provider tab within the Organization Center supports various configurations. IT Administrators can configure automatically using a metadata URL or uploading a SAML metadata file, or configure manually with sign-in and sign-out URLs, an identity provider ID and an uploaded verification certificate.

Download the SAML signing certificate.

Organization Center - Identity Provider page

General Identity Provider Setup Overview

A trust-relationship between two relying parties has been established when each party has acquired the necessary metadata about the partner for execution of a SAML Single Sign-On. At each relying party, the configuration information can be input dynamically or manually, depending on the interface offered by the IdP.

When introducing the GoTo SAML Service’s metadata at the IdP, you may be given an option to add a new Service Provider via metadata. In this case, you can simply populate the metadata URL field with:

In the event your IdP requires manual input of information, you’ll need to manually enter the parts of the metadata. Depending on your IdP, it may ask for different pieces of information or call these fields different things. To start, here are some of the configuration values that should be entered if your IdP asks for them.

  • EntityID – The GoTo SAML Service’s entityID is the metadata url. The IdP may sometimes refer to it as the IssuerID or the AppID. (
  • Audience – This is the EntityID of the GoTo SAML Service. An IdP may refer to it as the Audience Restriction. This should be set to:
  • ACS URL (Assertion Consumer Service URL) – The URL where authentication responses (containing assertions) are returned to:
    Note: The IdP may also refer to this as the ACS URL, the Post Back Url, the Reply URL, or the Single Sign On URL.
  • Single Logout URL – The destination of a logout request or logout response from the IdP:
  • NameID format – The type of the subject identifier to be returned in the Assertion. The GoTo SAML Service expects: EmailAddress

You can set a per-product RelayState to allow routing to different products from your IdP application catalog. Below are the RelayState values to set for GoTo products:

Central Not yet available.
GoToAssist Remote Support v4
GoToAssist Remote Support v5
GoToAssist (Service Desk)
GoTo Connect
GoTo Meeting
GoTo Resolve
GoTo Training
GoTo Webinar

During manual configuration of the GoTo SAML Service at the IdP, you may be presented with some additional options. Here is a list of potential options you may be presented and what you should set them to.

  • Sign assertion or response
    • Activate this option, the GoTo SAML service requires the IdP’s signature on the response.
  • Encrypt assertion or response
    • Deactivate this option, currently the SAML service is not processing encrypted assertions.
  • Include SAML Conditions
    • Activate this option, it’s required by the SAML Web SSO profile. This is a SecureAuth option.
  • SubjectConfirmationData Not Before
    • Deactivate this option, required by the SAML Web SSO profile. This is a SecureAuth option.
  • SAML Response InResponseTo
    • Activate this option. This is a SecureAuth option.

Add your Identity Provider to the Organization Center

Continue with the next step of setting up enterprise sign-in by returning to Step #3 in Set Up Enterprise Sign-In (SSO).

Article last updated: 17 October, 2023