Single Sign-On (SSO) Setup
Configure SAML-based SSO to allow team members to authenticate using your organization's identity provider.
Enterprise Feature
SSO is available on Enterprise plans. Contact sales for details.
Supported Providers
- Okta
- Azure Active Directory
- Google Workspace
- OneLogin
- Any SAML 2.0 compatible provider
General Setup Steps
- Go to Settings > SSO Configuration
- Note the ACS URL and Entity ID provided by SureStage
- In your IdP, create a new SAML application using these values
- Copy the IdP Metadata URL (or upload the metadata XML) back to SureStage
- Map the required attributes:
email(required)firstName(optional)lastName(optional)
- Click Test Connection
- Once verified, click Enable SSO
Enforcement
Optionally enforce SSO for all members:
- Optional - Members can use SSO or email/password
- Required - All members must use SSO (email/password disabled)
Provider-Specific Guides
Okta
- Create a new SAML 2.0 application in Okta admin
- Set the Single Sign-On URL to your SureStage ACS URL
- Set the Audience URI to your SureStage Entity ID
- Configure attribute statements for email, firstName, lastName
- Assign users/groups to the application
Azure AD
- In Azure Portal, go to Enterprise Applications > New Application
- Create a custom SAML application
- Set the Identifier and Reply URL from SureStage settings
- Configure user attributes and claims
- Assign users/groups
Next Steps
- SCIM Provisioning - Automate user provisioning alongside SSO
- Troubleshooting: SSO - Fix SSO configuration issues