Skip to main content

ConnectWise Control


Multi-factor authentication (MFA) is an extra layer of security used when logging into websites or apps to authenticate users through more than one required security and validation procedure that only they know or have access to. Security Assertion Markup Language (SAML) is a protocol for authenticating for web applications. SAML allows federated apps and organizations to communicate and trust one another’s users.

Acceptto™, as a SAML provider, improves the user login experience for ConnectWise Control users with its Intelligent SSO-MFA solution.


  1. An Acceptto account with a configured Identity Provider and LDAP Agent. See this page for instructions.

  2. A user with administrative privileges for ConnectWise Control.

Configure ConnectWise Control as a Service Provider (SP)#

  1. Download the SAML metadata for your organization from Acceptto at<myorganization>/saml/download/metadata.

  2. Before you begin, ensure that you have an Administrative user in a location that is not subject to the Acceptto MFA. This user will allow you to login back to your instance if there are any issues with the configuration.

  3. Log into your ConnectWise Control instance and go to Admin > Security. In the User Sources, click on Add User Source.

    Administration dashboard

  4. Select SAML.

    User Sources SAML

  5. In the SAML section, click on three dots. Select Enable.

    Enable SAML

  1. Click again on the three dots, and then click on Generate Metadata. Keep the Metadata for the next section.

  2. Click on the three dots and select Configure.

Enable SAML

  1. Fill the blank part with below information :

    IDP Metadata URL: Enter the Acceptto Metadata URL you obtained earlier. UserNameAttributeKey: NameID . UserDisplayNameAttributeKey: displayname. EmailAttributeKey: mail. Display Name: Acceptto.

    Edit User Source Configuration

  1. Click on Save Configuration.

Acceptto SAML Configuration as Identity Provider (IdP)#

  1. Login to the Acceptto Dashboard with an administrative account and go to Applications.

  2. Create a new application by selecting Create New Application.

  3. In the New Application form, enter the following values under the General tab.

    • Name - The application name displayed in the admin panel and application portal and used for push notifications and audit logs (e.g. connectwise-control)
    • Type - Select "SAML Service Provider" from the options
    • Out of Band Methods - Select the allowed methods for approving MFA requests
    • Message for MFA Requests - Enter the user-facing message for Push, SMS, and email MFA requests (optional)

    New application settings

  4. Under the SAML Service Provider Configuration tab, enter the following values:

    • Issuer or Entity ID – The Issuer/EntityID of your ConnectWise Control instance, which is in the Metadata file you downloaded in the previous section.
    • Sign in URL - The link used by your users to access the ConnectWise Control. (e.g
    • Metadata URL - The URL containing metadata about your ConnectWise Control instance, which you downloaded in the previous section. (e.g:{release}/auth/{companyId}/metadata)
    • ACS URL - The ACS URL of your ConnectWise Control instance, which is in the Metadata file.

    SAML service provider settings

  5. Click Save.

Test your setup#

  1. Open your ConnectWise Control URL in a browser and click on Connect with Acceptto.

    Connectwise Login

  2. You will be redirected to the Acceptto SAML page.

    Acceptto sign in

  3. After successful authentication, you’ll see Acceptto’s MFA options. Select your desired method of authentication.

    Acceptto MFA

  4. After approving the authentication request, the user will be redirected to the ConnectWise Control console.

    Connectwise Control console


If you require assistance, please email us at


Want to learn more about our MFA solutions? Contact our Professional Services for a Demo today.


All product names, trademarks, and registered trademarks are the property of their respective owners.

All company, product, and service names used in this document are for identification purposes only. The use of these names, trademarks, and brands do not constitute an endorsement by the Acceptto Corporation.