SSO Setup

Configure Single Sign-On with Microsoft Azure, Google, or OpenID Connect

SSO Setup Guide

Single Sign-On (SSO) allows your users to authenticate using their existing corporate credentials. This guide walks you through configuring SSO with supported identity providers.

Overview

SSO enables corporate users to leverage their organization's user directory as an identity provider for Appivo. You can choose from:

ProviderBest For
Microsoft AzureOrganizations using Azure Active Directory
Google G-SuiteOrganizations using Google Workspace
OpenID ConnectAny OpenID Connect compliant identity provider

Note: Only one SSO provider can be active at a time.

Microsoft Azure SSO

If your organization uses Microsoft Azure AD for identity management, follow these steps to configure SSO.

Step 1: Register an Application in Azure

  1. Log in to the Microsoft Azure portal
  2. Navigate to Azure Active Directory
  3. Click App Registrations
  4. Click New registration
  5. Enter a name for the application (e.g., "Appivo")
  6. For Account Type, select "Accounts in this organization directory only"
  7. For Redirect URI, select Web and enter:
https://apps.appivo.com/auth/<tenant-id>/callback

Note: You can find your specific callback URL at the top of the SSO configuration page in Appivo.

Step 2: Configure API Permissions

Add the required Microsoft Graph permissions:

  1. Click API permissions in the left menu
  2. Click + Add permission
  3. Select Microsoft Graph
  4. Select Delegated permissions
  5. Search for and add each of these permissions:
    • openid
    • offline_access
    • User.Read
    • User.ReadBasic.All
    • GroupMember.Read.All
  6. Click Grant admin consent for your organization

Step 3: Create a Client Secret

  1. Navigate to your app registration
  2. Click Certificates & Secrets
  3. Click New client secret
  4. Enter a description and select an expiration period
  5. Click Add
  6. Copy the secret value immediately - it won't be shown again

Step 4: Configure Appivo

Navigate to the SSO configuration page in Appivo and enter:

FieldDescription
Client IDThe Application (client) ID from Azure app registration overview
Client SecretThe secret value you copied in Step 3
Tenant IDThe Directory (tenant) ID from Azure app registration overview
Scopeopenid offline_access User.Read User.ReadBasic.All GroupMember.Read.All

Step 5: Complete Setup

  1. Enable Use proof key for code exchange (PKCE)
  2. Click Submit Configuration

Note: A custom login URL will be generated for your tenant upon successful configuration.

After enabling SSO, configure group mappings to automatically provision applications and roles to users based on their Azure AD groups.

Google SSO

Google Workspace users can sign in to Appivo using their Google credentials.

Prerequisites

Before configuring Google SSO in Appivo, you need to create OAuth 2.0 credentials in the Google Cloud Console:

  1. Go to the Google Cloud Console
  2. Create or select a project
  3. Navigate to APIs & Services > Credentials
  4. Click Create Credentials > OAuth client ID
  5. Configure the OAuth consent screen if prompted
  6. Select Web application as the application type
  7. Add your Appivo callback URL to Authorized redirect URIs

Configure Appivo

Navigate to the SSO configuration page in Appivo and enter:

FieldDescription
Client IDThe OAuth 2.0 Client ID from Google Cloud Console
Client SecretThe OAuth 2.0 Client Secret from Google Cloud Console
ScopeThe scopes to request (comma-separated)

Complete Setup

  1. Enable Use proof key for code exchange (PKCE)
  2. Click Submit Configuration

Note: A custom login URL will be generated for your tenant upon successful configuration.

OpenID Connect SSO

Appivo supports any OpenID Connect compliant identity provider, including:

  • Okta
  • Auth0
  • Keycloak
  • Ping Identity
  • OneLogin

Gather Provider Information

From your identity provider, collect the following endpoints and credentials:

Required InformationDescription
Client IDApplication identifier from your IdP
Client SecretApplication secret from your IdP
Token Endpoint URLURL for obtaining tokens
Authorization Endpoint URLURL for user authentication
User Info Endpoint URLURL for retrieving user claims

Configure Appivo

Navigate to the SSO configuration page and enter:

FieldDescription
Client IDYour application's client identifier
Client SecretYour application's client secret
Token endpoint URLEndpoint for obtaining ID, access, and refresh tokens
Authorization endpoint URLEndpoint for user authentication and authorization codes
User info endpoint URLEndpoint that returns user claims (including the sub identifier)
ScopeThe scopes to request (comma-separated)

Complete Setup

  1. Enable Use proof key for code exchange (PKCE)
  2. Click Submit Configuration

Note: A custom login URL will be generated for your tenant upon successful configuration.

Testing Your Configuration

After configuring SSO:

  1. Open your tenant's custom login URL in a private/incognito browser window
  2. Verify you're redirected to your identity provider
  3. Sign in with valid credentials
  4. Confirm you're redirected back to Appivo and logged in

Common Issues

IssueSolution
Redirect URI mismatchVerify the callback URL matches exactly in both Appivo and your IdP
Invalid client credentialsDouble-check the Client ID and Secret
Missing permissionsEnsure all required scopes are configured and consented
User not provisionedCheck group mappings or enable automatic user provisioning

Next Steps