Single Sign-On (SAML)
Log-in to your Kimai-Cloud with your company credentials
Users of your Kimai-Cloud can authenticate using an identity provider that supports SSO (Single Sign-On) via SAML. You find the configuration after login at: My Kimai-Cloud > SSO Authentication.
Currently, the following provider are supported:
If you are using another IDP and want to use Kimai: please get in touch, I am open for your ideas.
Important to know
- Existing cloud users will be upgraded to SAML logins, after their first SAML login (if identifier matches)
- SAML users cannot log in with password
- Without configured role mapping, every SAML user will only own the
User
role (previous Admins will be downgraded on every login)
Google SAML
Workspace configuration
- Go to https://admin.google.com/ac/apps/unified
- Choose “Add app” followed by “Add custom SAML app”
- Choose your name (e.g. “Kimai-Cloud Live”) and add this image
- Copy & paste the values from the Google Step-by-Step (page 2) guide into your Kimai-Cloud SAML configuration screen:
SSO-URL
intoSingle Sign-On URL
Entity-ID
intoEntity ID
Certificate
intoX.509 Certificate
- Copy & paste the values from the Kimai-Cloud SAML configuration screen into Google Step-by-Step guide (page 3):
ACS-URL
intoACS-URL
Entity ID
intoEntity-ID
- Choose the
Name-ID Format
: “X509_SUBJECT” - Select the
Name-ID
: “Basic Information > Primary Email”
- On page 4
Attributes
you have to define theUser attribute
mapping like this (correct case is important and you need to configure all attributes, even if you do not use them):Basic Information > Primary email
→Email
Basic Information > First name
→FirstName
Basic Information > Last name
→LastName
Employee Details > Employee ID
→AccountNumber
Employee Details > Title
→Title
- Back on the overview page: activate the new application for your users
- The last configuration step takes care of the
User role
mapping, which can be defined in two ways:- Using Google Groups (recommended):
- Create Groups for the Kimai roles you want to apply under Directory > Groups
- Apply these groups to your users
- Go back to edit your SAML application and configure the optional group-membership:
- Choose all groups you configured for Kimai and map them to the App-Attribute
Groups
- Choose all groups you configured for Kimai and map them to the App-Attribute
- Using a custom attribute:
- Create a User defined attribute called
SAML Group
- Add a field
KimaiRole
as text type with multi-value - Edit your users and apply the values within the new attribute:
- The value
Kimai-System
maps to the Kimai roleSystem-Admin
- The value
Kimai-Admin
maps to the Kimai roleAdministrator
- The value
Kimai-Teamlead
maps to the Kimai roleTeamlead
- The value
- Go back to edit your SAML application and configure one more attribute mapping:
- The Google directory attribute
SAML Group > KimaiRole
to the App-AttributeGroups
- The Google directory attribute
- Create a User defined attribute called
- Using Google Groups (recommended):
You can use other names for your groups, the mapping happens in the next step in your Cloud configuration.
This screenshot is a showcase of the attribute mapping including groups:

Cloud configuration

Microsoft SAML
Azure AD Configuration
- Sign in to the Azure portal.
- Select the Azure Active Directory service from the navigation.
- Navigate to Enterprise Applications and then select New application.
- In the “Browse Azure AD Gallery” section, type Azure AD SAML Toolkit in the search box and select it.
- Enter the application name to “Kimai-Cloud”, hit the “Creat” button add wait for the app to be added.
- On the “Overview” page select “Assign user and groups” and add all users that should have access to Kimai.
- Back on the “Overview” page select “Set up single sign on” and choose SAML as your choice.
- Edit the Basic SAML Configuration and add the required URLs:
- Identifier (Entity ID):
https://timetracking.example.com/auth/saml/metadata
- Reply URL (Assertion Consumer Service URL):
https://timetracking.example.com/auth/saml/acs
- Sign on URL:
https://timetracking.example.com/
- Identifier (Entity ID):
- After saving the URLs: edit the Attributes & Claims and configure required settings (see screenshot below):
- Change
Source attribute
of theUnique User Identifier (Name ID)
touser.mail
- Select
Add a group claim
with the settingsAll groups
and the Source attributeGroup ID
- Select
Add new claim
with Name:displayname
, Namespace:http://schemas.xmlsoap.org/ws/2005/05/identity/claims
, Source attribute:user.displayname
- Select
Add new claim
with Name:employeeid
, Namespace:http://schemas.xmlsoap.org/ws/2005/05/identity/claims
, Source attribute:user.employeeid
- Change
- Return to the SAML-based Sign-on page and download Certificate (Base64) from the “SAML Signing Certificate” section. Edit the
Kimai Cloud.cer
file and copy&paste the content into the Cloud configuration fieldX.509 Certificate
. - Copy the values of Set up Kimai-Cloud into the Cloud configuration:
- Login URL:
Login URL
- Azure AD Identifier:
Azure AD Identifier (SAML Entity ID)
- Login URL:
Configure “Attributes & Claims”:

Configure “Groups”:
- In the “Azure Active Directory” section, choose “Groups” from the navigation.
- Click “New group” (with the group type: Security) and repeat this action for each group:
- Set the name
Kimai Teamlead
and add members - Set the name
Kimai Admin
and add members - Set the name
Kimai System-Admin
and add members
- Set the name
- Copy & paste the
Object Id
of each group into the Cloud configuration (see screenshot below).

Cloud configuration

Costs
There are no additional costs involved, it is included in your paid plan.