Salesforce Identity Provider for EchoSign

Introduction :- 
In this blog post, I am going to explain step by step to setup the salesforce identity provider with EchoSign. Setting up echo sign Identity with salesforce is having mainly three stages namely configuring Salesforce identity provider, configure EchoSign, create connected apps 
Prerequisites :-
1.Enable My Domain in Salesforce 

2. Start you free tail
Step1: -Enable  Salesforce Identity Provider 

1. Navigate to Setup | Administration Setup | Security Controls | Identity Provider. You should see Identity Provider setup. Click on “Enabled Identity Provider

 2. (Optionally) change the self-signed certificate to a production certificate issued by a certificate authority.This certificate is used to sign SAML assertions


3.Click on Save.As shown below Click on the Download Certificate button to download the certificate. This certificate is used to setup service providers. 


4 . Salesforce Identity Provider exposes the following endpoints. You would need these when configuring SAML at the service provider. (replace your domain with your MyDomain value) (replace your domain with your MyDomain value)

Step 2: Configure EchoSign 

  1. Sign in to your EchoSign account.
  2. Click on Account | Account Settings
  3. Click on SAML Settings tab under Account Settings.In the right side, you will see an option for SAML Mode, select SAML Allowed mode if you want users to sign in to EchoSign account using SAML as well as EchoSign credentials. Else select SAML Mandatory mode to sign in using SAML only.

4.A dedicated Hostname is required to enable SAML. If you already have dedicated hostname then this option will not be there. Otherwise, enter your hostname.

5.Under User Creation, check if you would like users to be provisioned into EchoSign when they sign in without an account.

6. Under Login Page Customization, you can enter Single Sign on Login message. It will be shown when you go for SP-initiated SSO. e.g. Sign In using Salesforce

7.Enter IdP Entity ID as your SAML IdP Issuer i.e. 

8.Enter IdP Login URL as SP-Initiated Redirect Endpoint” URL i.e. 

9.Enter IdP Logout URL i.e. e.g.

10.Enter IdP Certificate content.

11.You will see EchoSign SAML Service Provider (SP) Information. Note down these URLs as you will need them in Salesforce side Configuration.

12.Click Save Changes button to save the settings.


Step 3 :Configure salesforce connect app:- 

  1. Log in as an Administrator, and navigate to Setup | App Setup | Create | Apps
  2. Under Connected Apps section, click New.
  3. Under Basic Information,
    1. Provide Connected App Name
    2. The field API Name is auto-populated
    3. In the field Logo Image URL, select Choose one of our sample logos, find the logo, and copy past the logo URL. Or, enter your own URL.
    4. In the field Contact Email, enter your email address. 


Under Web App Settings,

  1. Select Enable SAML
  2. Enter Entity ID as
  3. Enter ACS URL as 
  4. Select Subject Type. e.g. Federation ID. Please note that SAML Subject must carry the same identity as of EchoSign user’s account ID i.e. email.
  5. In the field Name ID Format, keep the default selection (unspecified)
  6. In the field Issuer, keep the default value
  7. In the field Service Provider Certificate, keep the default (unselected)

  1. Save the settings.
  2. Go to Manage Apps | Connected Apps
  3. Select your App.
  4. Click Manage Profiles or Manage Permission Sets and add profiles/permission sets of users who can access this app.



IdP Initiated Login URL: It will be used to test the IdP initiated SSO. Right click IdP-Initiated Login URL, and copy the link into a notepad.

  1. Click Edit Policies 
  2. In the field Start URL, copy and paste the URL from Notepad.
  3. Click Save.
  4. SSO setup for EchoSign is complete.

After Configured the Policies, you can see the EchoSign App in App launcher as shown below. 


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s