Configuring SSO
Enable Single Sign-On (SSO) to let users authenticate with your organization's Identity Provider.
Prerequisites
- Administrative access to Console
- Access to your Identity Provider (IdP) configuration
- IdP details (Client ID, Secret, or SAML metadata)
Choosing a Protocol
| Protocol | Best For | Common Providers |
|---|---|---|
| OIDC | Modern applications | Okta, Auth0, Azure AD, Google |
| SAML 2.0 | Legacy systems | Active Directory, Shibboleth |
Configuring OIDC
Step 1: Get IdP Details
From your Identity Provider, collect:
- Issuer URL (e.g.,
https://your-domain.okta.com) - Client ID
- Client Secret
- Redirect URI:
https://console.solucao42.com.br/auth/callback
Step 2: Configure in Console
- Go to Settings → Single Sign-On
- Select OIDC as protocol
- Fill in the details:
- Issuer URL
- Client ID
- Client Secret
- Map user attributes:
- Email →
email - Name →
name
- Email →
- Click Save
Step 3: Test the Configuration
- Click Test SSO
- You'll be redirected to your IdP
- Log in with test credentials
- Verify you're redirected back to Console
- Check user details are correct
Step 4: Enable for Organization
- Enable SSO Enabled
- (Optional) Enable Require SSO to disable other login methods
- Click Save Changes
Configuring SAML
Step 1: Get SAML Metadata
From your IdP:
- Download SAML metadata XML file
- Or note the metadata URL
Step 2: Configure in Console
- Go to Settings → Single Sign-On
- Select SAML 2.0 as protocol
- Choose upload method:
- Metadata URL: Enter the URL
- Upload XML: Upload metadata file
- Console will parse the metadata automatically
Step 3: Configure Your IdP
Provide these values to your IdP admin:
- Entity ID:
https://console.solucao42.com.br - ACS URL:
https://console.solucao42.com.br/auth/saml/callback - Name ID Format: Email address
Step 4: Map Attributes
Map SAML attributes to Console fields:
- Email →
emailornameID - Name →
displayNameorname - Groups (optional) →
groups
Step 5: Test and Enable
- Click Test SAML
- Verify authentication works
- Enable SSO for your organization
Just-In-Time (JIT) Provisioning
Automatically create users on first SSO login:
- Go to Settings → Single Sign-On
- Enable JIT Provisioning
- Set default groups for new users
- Save changes
Benefits:
- No need to pre-invite users
- Users created automatically on first login
- Assigned to default groups automatically
SSO Enforcement
Require all users to use SSO:
- Configure and test SSO first
- Enable Require SSO for all users
- Other login methods are disabled
- Users must authenticate via IdP
warning
Test SSO thoroughly before enforcing it to avoid locking out users.
Troubleshooting
Common Issues
"Invalid issuer" error:
- Verify Issuer URL is correct
- Check for trailing slashes
"Redirect URI mismatch":
- Ensure redirect URI in IdP matches exactly
- Check for http vs https
"Attribute mapping failed":
- Verify IdP sends required attributes (email)
- Check attribute names match configuration
Users can't log in after enabling SSO:
- Verify SSO is working via test button
- Check user exists in IdP
- Review Console audit logs
Next Steps
- Enabling 2FA - Add two-factor authentication
- Security Concept - Security best practices
Need Help?
Contact [email protected] for SSO configuration assistance.