Configure SAML 2.0 SSO for agent access to Reach Central.
Set up SAML-based SSO so agents sign in with your IdP.
Overview
Agent SSO lets agents sign in to Reach Central using brand-managed credentials. Reach supports SAML 2.0 and integrates with your Identity Provider (IdP).
Reach never stores passwords. Authentication always happens on your systems.
This page covers agent SSO only. For end-customer SSO, use SSO — End Customers.
Why brands enable agent SSO
Remove duplicate Reach Central credentials.
Keep MFA, lockouts, and password policy in your IdP.
Improve agent productivity with fewer login resets.
Increase auditability for agent actions.
Who it applies to
Customer support agents
Sales agents
Brand operational users
How authentication works (SP-initiated SAML 2.0)
Reach uses a Service Provider (SP)-initiated SAML flow.
1
Agent initiates login
Agent starts login from Reach Central.
2
Redirect to your IdP
Reach redirects the agent to your IdP login page.
3
Authentication happens on your systems
Agent enters credentials in your IdP. Reach is not involved in credential validation.
4
IdP sends a signed SAML assertion to Reach
Your IdP sends a digitally signed SAML response to Reach.
5
Reach validates and establishes a session
Reach validates the signature and required attributes. Reach then creates a session for Reach Central.
Required identity attributes (agent assertion)
The SAML assertion must include the fields Reach uses to identify the agent. You define the exact attribute names during mapping.
Attribute
Required
What Reach uses it for
Agent email
Yes
Primary identifier to map the agent to a Reach Central user.
Agent name
Yes
Display name in Reach Central. Also used in audit logs and reporting.
Agent ID
No
Reporting attribution and operational analytics.
Agent role / groups
No
Optional input to role mapping if you enable role-based access via SSO.
Sample SAML SSO Attribute Payload (Reach)
These examples show the attributes Reach expects after mapping.
Your IdP attribute names can differ. Reach maps them during setup.
Agent SSO (Reach Central) – role parameters
Example (Agent login)
Authorization and attribution
SSO covers authentication only. It does not automatically grant permissions.
Authentication: proven by the IdP via SAML.
Authorization: controlled by Reach Central roles and permissions.
Agent actions (customer changes, purchases, support operations) are attributed to the authenticated agent. This supports agent-level auditability in reporting.
Session behavior
Reach Central access is granted via a session token created after SAML validation.
If the session token expires or is invalid, Reach Central requires re-authentication via your IdP.
Security model
Your brand remains the system of record for identity.
Your brand controls password policies, MFA requirements, lockouts, and access revocation.
Reach trusts only digitally signed SAML assertions.