Skip to main content

Single Sign-On (SSO)

Configure enterprise SSO for your organization using OIDC or SAML providers

SSOOIDCSAMLauthenticationenterprise

Single Sign-On (SSO)

Single sign-on allows your organization members to authenticate using your corporate identity provider. Users sign in once with their company credentials and gain access to Securtea without managing separate passwords.

Benefits of SSO

For Users

  • One password - Use existing corporate credentials
  • Faster access - Skip separate login screens
  • Familiar experience - Same authentication as other work apps

For Administrators

  • Centralized control - Manage access from your identity provider
  • Improved security - Enforce corporate authentication policies
  • Automatic provisioning - New users are created automatically
  • Easy offboarding - Disable IdP access to revoke Securtea access

Supported Protocols

Securtea supports two industry-standard authentication protocols:

OpenID Connect (OIDC)

OIDC is a modern authentication protocol built on OAuth 2.0:

  • Recommended for: Most organizations
  • Best with: Microsoft Entra ID, Okta, Auth0, Google Workspace
  • Setup complexity: Low to moderate
  • Configure OIDC

SAML 2.0

SAML is an established enterprise authentication standard:

  • Recommended for: Organizations with existing SAML infrastructure
  • Best with: Traditional enterprise identity providers
  • Setup complexity: Moderate
  • Configure SAML

Identity Provider Guides

We provide specific guides for popular identity providers:

ProviderProtocolGuide
Microsoft Entra IDOIDCSetup Guide
Generic OIDCOIDCSetup Guide
Generic SAMLSAMLSetup Guide

How SSO Works

Authentication Flow

  1. User visits Securtea and enters their email address
  2. Securtea detects SSO based on the email domain
  3. Redirect to IdP - User is sent to the identity provider
  4. User authenticates with corporate credentials
  5. IdP validates the user and returns a token
  6. Securtea receives the token and creates/updates the user
  7. User is signed in to their Securtea dashboard

Just-in-Time Provisioning

When a user signs in via SSO for the first time:

  • User account created - A Securtea user is created automatically
  • Email verified - Provider-verified emails are trusted
  • Organization membership - User is added to your organization
  • Role assigned - Default role based on IdP attributes or configuration

Prerequisites

Before configuring SSO, ensure you have:

  • Securtea Organization - Complete basic onboarding first
  • Admin access to your IdP - You'll create an application/integration
  • Organization owner or admin role - In Securtea
  • Your email domain - The domain to enable SSO for (e.g., yourcompany.com)

Configuration Overview

Setting up SSO involves two parts:

1. Identity Provider Configuration

Create an application in your IdP:

  • Register Securtea as a trusted application
  • Configure the callback URL
  • Set up user attribute mappings
  • Generate client credentials

2. Securtea Configuration

Enter the IdP details in Securtea:

  • Specify your email domain
  • Enter the IdP configuration (issuer URL, client ID, etc.)
  • Test the connection
  • Enable SSO for your organization

Email Domain Restrictions

SSO is configured per email domain:

  • Only one SSO configuration per organization
  • Users with matching domains are redirected to SSO
  • Users with non-matching domains use standard authentication

Example: If SSO is configured for acme.com:

  • john@acme.com → Redirected to SSO
  • jane@partner.com → Standard email/password login

SSO and Existing Users

When you enable SSO for a domain:

  • Existing users with matching emails can now use SSO
  • Their accounts are linked automatically on first SSO sign-in
  • Password login remains available until explicitly disabled
  • No data is lost - Everything transfers seamlessly

Role Assignment

SSO users receive roles based on:

  1. IdP attributes - If your IdP sends job title or department
  2. Default role - Configured fallback role
  3. Admin override - Manually assigned by organization admins
IdP SignalAssigned Role
IT, Security, Admin in titleOrganization Admin
Manager, Director in titleOrganization Member
Other or no signalSSO User (read-only)

Limitations

Current SSO implementation has these constraints:

  • One SSO provider - Only one OIDC or SAML provider per organization
  • Single domain - One email domain per SSO configuration
  • No IdP-initiated login - Users must start from Securtea

Troubleshooting

Common Issues

  • Redirect loop - Check callback URL configuration
  • Invalid token - Verify client credentials
  • User not created - Check email domain matching
  • Wrong organization - Ensure domain maps to correct org

Detailed troubleshooting is available in each protocol-specific guide.

Removing SSO

To disable SSO and revert to standard authentication:

  1. Go to Settings > Organization > SSO
  2. Click Remove Configuration
  3. Confirm the action

What's Next?

Choose your SSO configuration:

Global Search

Search for pages, settings, and documentation