Dashlane's single sign-on (SSO) feature allows your users to sign in to their Dashlane vault using their SSO credentials instead of a Master Password. Below are instructions to set it up using G Suite.
Please note that this feature is exclusive for the Dashlane Business customers.
Overview of single sign-on (SSO)
Today, the Master Password is used as one of the keys to encrypt and decrypt user data. Now, with SSO, your users can sign in to their Dashlane vault using their SSO credentials instead of a Master Password. Together with Dashlane's SSO Connector, users can sign in with their SSO credentials, all while Dashlane retains its zero-knowledge security architecture.
When a user attempts to sign in using SSO, they are redirected to the SSO Connector, which federates to the identity provider.
After the user successfully signs in, the SSO Connector sends a unique key to the client which then decrypts the user's data.
All user keys are managed by the SSO Connector. In order to maintain our patented zero-knowledge security architecture, the SSO Connector needs to be hosted in an environment controlled by your organization. The SSO Connector runs on Docker and can be hosted in any environment where Docker is present.
Dashlane specific requirements
- Dashlane Business (Dashlane Team does not support SSO)
- Minimum version of the Dashlane app:
- Web: v6.2030.3
- iOS: v6.2029.0
- Android: v6.2030.1
- Desktop apps are not supported
Customer environment requirements
- G Suite as the identity provider
- Linux virtual machine that supports Docker (no prior knowledge of Linux or Docker is required to deploy the SSO connector)
- The SSO Connector service needs to be accessible to end users using HTTPS. A SSL Certificate will be required if the Linux machine is directly reachable by web.
Verify your domain
You will need to verify the domain that your organization owns. Once you enable SSO, all users that are using your organization's domain will be required to use SSO to sign in.
1. Visit the Dashlane Admin Console and navigate to the Settings tab.
2. Click the SAML SSO tab. In the Verify your company email domain field, enter your company's domain name and click the Verify button.
3. Copy the Hostname and TXT values and add them to a new DNS TXT record for your domain. Once added, click on the Verify domain button. Please note that it can take up to 24 hours to verify the domain.
You must verify your domain before you can configure the SSO Connector.
SSO Connector configuration steps
Create an application in G Suite
1. Navigate to the G Suite Admin center in G Suite and open your Apps. Click on SAML apps.
2. Click on Add a service/App to your domain.
3. In the filter, search for Dashlane, and then select Dashlane.
4. Under Option 2, download the IDP metadata. This will download a file called GoogleIDPMetadata.xml. You will need this file in the next section.
5. Click on Next.
6. For the Basic information for Dashlane, you won't need to change anything. Simply click on Next again.
7. Set the ACS URL to https://<SSO Connector Endpoint>/saml/callback, where SSO Connector Endpoint URL is where the SSO Connector is hosted and can be publicly reached. Ensure to include /saml/callback at the end of the path.
8. Set the Entity ID to https://<SSO ConnectorEndpoint>/saml/, where SSO Connector Endpoint URL is where the SSO Connector is hosted and can be publicly reached. Ensure to include /saml/ at the end of the path.
9. Click on Finish.
Configure the SSO Connector
1. Navigate back to the SAML SSO section of the Settings tab in the Admin Console.
2. Open the GoogleIDPMetadata.xml file that you downloaded in the section above. Copy and paste the contents of the file (the SAML metadata of G Suite) into the Enter the identity provider metadata field.
3. Enter the URL where your SSO Connector instance will exist. This is the URL that the SSO Connector service can be reached (such as https://ssoconnector.company.com).
Note: /saml/login may be automatically appended to the end of your path.
4. Click on the Generate SSO Connector key button. This will generate a key that will be used to encrypt all the your company's data. Copy the generated key and save it somewhere secure (such as a secure note in Dashlane). We also recommend sharing it with any other admins as well. You will not be able to see this key again.
5. Click on the Download Config file button.
6. Click on the Installation script button to complete the set up for the SSO Connector service.
Testing and enabling SSO
You must set up the SSO Connector before proceeding further and, within G Suite, assign at least one user to Dashlane who can sign in using SSO.
1. You can do a quick test to ensure that SSO Connector and G Suite are configured correctly. To do so, navigate back to the Dashlane admin console and click on Test Connection.
You can sign in using any Google user account that has access to the Dashlane application within G Suite. Once you successfully sign in, you should see a Success message. If you don't, contact Dashlane Support for help.
2. You can now enable SSO for all your users! Remember, admins within Dashlane will not be impacted and will continue to sign in using their Master Password. All other users will be forced to use SSO to access Dashlane.
Warning: While the SSO feature is in preview, you won't be able to invite users with existing Dashlane accounts or promote anyone to Admin. See the limitations for SSO for more information.