Connect your identity provider using guided SSO wizard
Prerequisites
Before you begin, ensure you have:- Administrator access to your identity provider
- Organization admin privileges
- Domain verification completed for your organization
- SSL certificate configured on your IdP (recommended)
Setup guide
Access SSO configuration
Navigate to integrations
- Go to Settings > Integrations
- Find Single Sign-On in the Organization section
Configure identity provider
Follow configuration guide
Follow the step-by-step instructions specific to your chosen identity provider to configure your IdP with required settings
Configure connection details
Enter the required information from your identity provider setup:
- Entity ID: Your organization’s unique identifier in the IdP
- Client ID: The application ID registered in your IdP
- Client Secret: The secret key used to authenticate with the IdP
Configure domain settings
Review default managed domain
Your organization’s email domain is automatically included as a managed domain for SSO (requires no additional verification)
Add additional domains (optional)
- Click Add Domain if you need additional email domains
- Additional domains require domain ownership verification
- Add the provided TXT record to your domain’s DNS settings
SSO enforcement
After enabling SSO, you have control over which authentication methods your users can access.Automatic SSO redirect for new users
Automatic SSO redirect for new users
When a new user enters an email address with a domain matching your SSO configuration, they are automatically redirected to authenticate through your identity provider instead of receiving an email invitation.This ensures that all users from your managed domains authenticate through your corporate identity provider from their first login.
Disable other login methods
Disable other login methods
By default, users can still authenticate through email/password or Google sign-in even after SSO is enabled. Organization admins can explicitly disable these alternative authentication methods to enforce SSO-only access.
Locate SSO enforcement section
Find the Enforce SSO-Only Authentication section (only visible after SSO is enabled)
Disable other methods
Click Disable Other Methods to remove email/password and Google sign-in options
Users will only be able to authenticate through your identity provider after other methods are disabled. This provides complete control over authentication in your organization.
Restoring other login methods
Restoring other login methods
If you need to restore email/password and Google sign-in options, you can do so by detaching your SSO connection. This automatically re-enables the default authentication methods.
Test and complete setup
Test SSO configuration
- Use the built-in test functionality to verify your SSO configuration
- Review test results to ensure authentication is working properly
- Resolve any issues shown in the test results
Troubleshooting
Authentication response invalid
Authentication response invalid
Cause: Incorrect certificate or signature validation issuesSolution:
- Verify certificates and keys are correctly configured
- Ensure proper formatting of authentication credentials
- Check that the IdP is using the correct signing configuration
User attributes missing
User attributes missing
Cause: Incorrect attribute mapping configurationSolution:
- Verify attribute names match those sent by your IdP
- Check authentication response in browser developer tools
- Ensure all required attributes are being sent by the IdP
Domain not configured
Domain not configured
Cause: User’s email domain is not added to SSO configurationSolution:
- Add the user’s email domain to the configured domains list
- Ensure domain verification is completed
Test authentication fails
Test authentication fails
Cause: Configuration mismatch or network connectivity issuesSolution:
- Double-check all configuration values in both systems
- Verify callback URLs are accessible and correct
- Check IdP logs for specific error messages
- Test network connectivity between systems