Skip to content

Single Sign-On (SSO)

Single Sign-On (SSO) allows your team members to authenticate with SetGet using your organization's existing identity provider (IdP). SetGet supports SAML 2.0 for SSO, which integrates with identity providers like Okta, Azure Active Directory, Google Workspace, OneLogin, PingIdentity, and others.

Why use SSO

BenefitDescription
Centralized authenticationManage all user access from your IdP — one place for provisioning, deprovisioning, and policy enforcement
Reduced password fatigueUsers sign in with their corporate credentials; no separate SetGet password to remember
Stronger securityLeverage your IdP's security policies: MFA, conditional access, device trust
Automatic provisioningNew users are created in SetGet automatically on first SSO sign-in
ComplianceMeet enterprise audit requirements with centralized authentication logs

Prerequisites

Before configuring SSO, ensure you have:

  • A SetGet workspace with an Owner or Admin role
  • Access to your organization's SAML 2.0 identity provider admin console
  • The ability to create a new SAML application in your IdP

SetGet SP metadata

SetGet acts as the SAML Service Provider (SP). You will need the following values when configuring the SAML application in your IdP:

FieldValue
Entity ID (SP Entity ID)https://your-setget-domain.com/auth/saml/metadata
ACS URL (Assertion Consumer Service)https://your-setget-domain.com/auth/saml/callback
SLO URL (Single Logout)https://your-setget-domain.com/auth/saml/logout (optional)
Name ID formaturn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
BindingHTTP-POST

TIP

Replace your-setget-domain.com with your actual SetGet instance domain. If you are unsure of the exact URLs, check Workspace Settings > Security > SSO where the SP metadata values are displayed.

Identity provider setup

The exact steps vary by IdP, but the general process is:

Step 1: Create a SAML application

In your IdP admin console, create a new SAML 2.0 application. Common IdP instructions:

Identity ProviderWhere to create
OktaApplications > Create App Integration > SAML 2.0
Azure ADEnterprise Applications > New Application > Create your own
Google WorkspaceApps > Web and mobile apps > Add app > Add custom SAML app
OneLoginApplications > Add App > SAML Custom Connector
PingIdentityConnections > Applications > Add Application

Step 2: Configure SAML settings

Enter the SetGet SP metadata values from the table above:

  1. Set the ACS URL (also called Reply URL or Single Sign-On URL).
  2. Set the Entity ID (also called Audience URI or Identifier).
  3. Set the Name ID format to Email.
  4. Set the Binding to HTTP-POST.

Step 3: Configure attribute mapping

SetGet expects the following SAML attributes in the assertion:

SAML attributeMaps toRequired
email or NameIDUser email addressYes
first_name or givenNameUser first nameRecommended
last_name or surnameUser last nameRecommended
display_nameUser display nameOptional (falls back to first + last)

WARNING

The email attribute (or NameID with email format) is mandatory. Without it, SetGet cannot identify the user. Ensure your IdP sends the email in the SAML assertion.

Step 4: Download IdP metadata

From your IdP, download or copy the following:

ItemDescription
IdP Entity IDThe unique identifier for your identity provider
SSO URLThe URL where SetGet sends SAML authentication requests
CertificateThe X.509 certificate used to verify SAML assertion signatures
Metadata XML (optional)A single XML file containing all of the above

Configure SSO in SetGet

  1. Sign in to SetGet as a workspace Owner or Admin.
  2. Navigate to Workspace Settings > Security > SSO.
  3. Click Configure SSO or Edit SSO Configuration.
  4. Enter the IdP details:
FieldWhat to enter
IdP Entity IDThe entity ID from your IdP
SSO URLThe single sign-on URL from your IdP
CertificatePaste the X.509 certificate (PEM format)
Metadata XMLAlternatively, upload or paste the metadata XML to auto-fill all fields
  1. Click Save Configuration.
  2. Click Test SSO to verify the connection.

The test initiates a SAML flow in a new browser tab. If successful, you see a confirmation message with the authenticated user's attributes.

WARNING

Always test SSO before enforcing it. If SSO is misconfigured and enforced, workspace members (including admins) may be locked out.

Attribute mapping

After saving the base configuration, verify that attribute mapping is correct:

  1. In the SSO settings, click Attribute Mapping.
  2. Review the mappings:
SetGet fieldExpected SAML attributeFallback
Emailemail, NameIDNone (required)
Display namedisplay_name, displayNameConstructed from first + last name
First namefirst_name, givenNameExtracted from display name
Last namelast_name, surname, snExtracted from display name
  1. If your IdP uses different attribute names, update the mappings to match.
  2. Click Save.

SSO enforcement

By default, SSO is available as an optional sign-in method alongside email/password and OAuth. You can enforce SSO to require all members to authenticate through the IdP:

Enable enforcement

  1. Navigate to Workspace Settings > Security > SSO.
  2. Toggle Enforce SSO to on.
  3. Confirm the action.

Enforcement behavior

ScenarioBehavior with enforcement
Existing member signs inRedirected to IdP; email/password form is hidden
New user visits sign-in pageOnly SSO option is shown
Password reset requestDisabled (passwords are not used)
OAuth sign-inDisabled (only SSO is allowed)
Magic link sign-inDisabled (only SSO is allowed)
API token authenticationStill allowed (tokens bypass SSO)

WARNING

Before enforcing SSO, ensure that at least one workspace owner can successfully authenticate through the IdP. If SSO is misconfigured after enforcement, contact your instance administrator to disable enforcement at the server level.

Emergency access

If SSO enforcement locks out all admins:

  1. An instance administrator can access the admin panel directly.
  2. Navigate to the workspace SSO settings in the admin panel.
  3. Disable SSO enforcement.
  4. Fix the SSO configuration and re-enable enforcement.

SSO + local authentication coexistence

When SSO is not enforced, both SSO and local authentication methods work simultaneously:

Sign-in methodAvailable
Email + passwordYes
Magic linkYes
OAuth (Google, GitHub, etc.)Yes (if configured)
SSO (SAML)Yes

Users can choose their preferred method. If a user signs in via SSO for the first time and an account with the same email already exists (created via email/password), the accounts are linked automatically.

Account linking

ScenarioBehavior
New email via SSONew account created automatically
Existing email via SSOExisting account linked to SSO identity
SSO user tries email/passwordAllowed (if enforcement is off)
Email/password user tries SSOAllowed; accounts are merged

Just-in-time provisioning

When a user authenticates via SSO for the first time and does not have an existing SetGet account, SetGet automatically creates an account for them. This is called just-in-time (JIT) provisioning:

  • The user's email, name, and display name are populated from the SAML assertion.
  • The user is added to the workspace with the Member role by default.
  • No manual invitation is required.

To assign specific roles automatically, see Group Sync.

Troubleshooting

IssueLikely causeResolution
"Invalid SAML response" errorCertificate mismatchRe-download the IdP certificate and update it in SetGet
User attributes are missingAttribute mapping incorrectVerify attribute names in IdP match SetGet expectations
SSO loop (redirects back to IdP)ACS URL misconfiguredVerify the ACS URL in your IdP matches exactly
User created without nameName attributes not sentAdd first_name and last_name to IdP attribute release
Locked out after enforcementSSO misconfiguredUse instance admin panel to disable enforcement