# SentinalOne

To setup SentinelOne, we just need two pieces of information (See Vendor Setup Information for more information)

The only required parameter is the users email address, so we will assign the default SamlID field as that parameter.

1. Assertion Consumer Service URL:This url can be found in the SAML configuration via SentinelOne.
2. SP Entity ID:This url can be found in the SAML configuration via SentinelOne.

**You will need to have an Administrator account to setup SSO.**

To set up single sign-on (SSO) for SentinelOne, you can do the following:

1. Log in to your SentinelOne account as an administrator.
2. Click Settings in the left menu sidebar.
3. Click the Integrations tab.
4. Click SSO under Types.
5. Toggle on Enable SSO.

Copy and paste the following URLs from SentinelOne into Key9 **Setup Items**

1. **Assertion Consumer Service URL**
2. **SP Entity ID**

Click the **Create Application** button in Key9.

After you have created your Key9 application, click the **SSO** tab in the side navigation.

**Back in the SentinelOne console:**

1. Enter your **Domain Name(s)**.
2. Leave the **Auto Provisioning** box unchecked.
3. Leave the **Sign SAML Request** box unchecked.

Copy the following information from the Key9 **SSO** tab to SentinelOne:

1. Copy the Key9 **Entity ID** url to the **IssuerID** field.
2. Copy the Key9 **SSO** url to the **IDP redirect URL** field.
3. Download the Key9 **X.509 Certificate** for upload to the **IDP public certificate** field.

(To view and copy the x509 certificate in Key9, select **View Certificate Details** from the **Certificate Options** dropdown menu, then click the copy icon.)

**Click Test, then Save**

\-------------------

By default, applications are not active upon creation. Active applications are immediately available to assign groups. Applications should only be activated when you have configured the Service Provider (SP).
