Once the SurveyMonkey Apply site is “launched”, and the SSO integration is set up, you will want to ensure “Registration is OPEN” for the site in general. To open site registration:
- Go to the Settings tab (gear icon)
- Select Registration
- Adjust the Applicant Registration option to “Allow any site visitor to register as an applicant”
If you do not allow site visitors to register, users not already existing in SM Apply will not be successfully added to the users page and registered as an applicant, nor will they be able to create applications. This happens because when a user signs in for the first time using the SSO, SM Apply registers this user with an account if a user account does not already exist.
Homepage Sign In buttons:
Both the log-in and register buttons will redirect them to your log-in page.
NOTE: Any users who are not logging in through the SSO can log in through the SurveyMonkey Apply Log in button.
Invited users (recommenders, collaborators) will sign in through native login as there is no guarantee that the SSO-related email address will be used. These types of users should access the site through their invited email or through the SurveyMonkey Apply Log In button.
Administrators without an SSO account login can still sign in to the site through the SM Apply login. To access the sign-on page you can also add /admin/ to the end of the site's UR.. For example: testsite.Apply.com/admin/
Contact details for the primary individual implementing the SSO integration on the your end should be provided to your Customer Engagement Representative.
SAML Integration: Consumption of Apply Metadata
It is recommended that your IdP is configured to auto-update SM Apply’s SP metadata. There are two reasons for this:
- For security purposes; we may release updates to our metadata (certificate updates, encryption values)
- For stability; metadata updates can introduce periods of time where the SAML connection may fail due to non-matching certificates
- Changing an SM Apply site’s domain to a custom domain will reflect changes in the SP metadata
SAML SSO integration for sites with Custom Domains
Sites wishing to use a custom domain should have a domain in place prior to configuring SAML. If the custom domain is not added to the site prior to SAML being set up, issues might occur as Apply’s metadata may reference a URL that is unknown to your IdP.