Single Sign-On (SSO)
Configure SSO for your Saylo project
Single Sign-On (SSO)
Allow users to login with their existing accounts using your organization's identity provider.
What you'll get
- Seamless login experience for your users
- Centralized user management
- Enhanced security with existing policies
- Reduced administrative overhead
Supported providers
Enterprise SSO
- Google Workspace - OAuth 2.0 integration
- Microsoft 365 - SAML 2.0 and OAuth 2.0
- Okta - SAML 2.0 integration
- Auth0 - SAML 2.0 integration
- OneLogin - SAML 2.0 integration
- Custom SAML - Any SAML 2.0 compliant provider
Social login
- Google - OAuth 2.0
- GitHub - OAuth 2.0
- Microsoft - OAuth 2.0
Setup
Step 1: Choose your provider
Select the SSO provider that matches your organization's authentication system.
Step 2: Configure provider settings
Google Workspace
- Go to Google Cloud Console
- Create a new project or select existing
- Enable Google+ API
- Create OAuth 2.0 credentials
- Add authorized redirect URIs
Microsoft 365
- Go to Azure Portal
- Register new application
- Configure redirect URIs
- Set required permissions
SAML Provider
- Set up SAML application in your IdP
- Configure entity ID and ACS URL
- Download metadata or configure manually
Step 3: Configure in Saylo
- Go to your Saylo dashboard
- Navigate to Settings → Authentication
- Click on Single Sign-On
- Select your SSO provider
- Enter configuration details
- Test the connection
Step 4: Configure user mapping
- Map provider attributes to Saylo user fields
- Set up automatic user provisioning
- Configure role assignments
- Test authentication flow
Configuration options
User provisioning
- Automatic provisioning - Create accounts automatically
- Just-in-time provisioning - Create accounts on first login
- Manual approval - Require admin approval for new users
Attribute mapping
Map your provider's user attributes to Saylo user fields:
- Email - Primary identifier
- Name - Display name
- Groups/Roles - Permission assignments
- Custom attributes - Additional user data
Access control
- Domain restrictions - Limit to specific email domains
- Group-based access - Restrict to specific groups
- Role assignments - Automatic role assignment based on groups
Security
Best practices
- Use HTTPS for all connections
- Regular certificate rotation
- Monitor access logs
- Implement MFA when possible
- Regular security audits
Compliance
- GDPR compliance for user data handling
- SOC 2 compliance for security controls
- HIPAA compliance for healthcare data
- Enterprise security policies
Troubleshooting
Authentication failures
- Check provider configuration in your IdP
- Validate certificates are valid and not expired
- Verify user attributes are correctly mapped
- Review error logs for specific messages
User provisioning issues
- Ensure required attributes are mapped
- Confirm user email domains are allowed
- Verify group membership and role mapping
- Check user limits haven't been exceeded
Performance issues
- Monitor IdP response times
- Request only necessary attributes
- Implement caching when possible
- Ensure adequate infrastructure resources
Need help?
- Check your IdP's documentation
- Contact your identity provider support
- Review Saylo authentication logs