If you are an admin user, you can customize SSO options for your organization with a number of available identity providers, including Azure and Google. Then, users can enter the credentials associated with their identity provider to log in to Virtuous.
Before configuring WorkOS for SSO, you will need to reach out to your Account Manager to set up your subscription. You must also have admin permissions to configure SSO.
Once You Are Subscribed
Go to Settings > Organization Settings. For "Allowed SSO Provider," be sure you have either selected "Any" or "SSO."
Configuring WorkOS
Now that you have allowed SSO, go to Settings > All Settings. Select the Connectivity tab where you will see SSO as an option.
Add your organization's primary domain to the corresponding field - only one domain can be used.
Then select "Save and Continue"
Then select "Save and Continue"
This will take you to the WorkOS screen where you can select one identity provider and then "Get Started."
Part of this configuration includes sharing tokens and URLs between WorkOS and your identity provider. You will be taken to a screen with further direction on how to initiate that share depending on the provider you selected.
(This image is specifically for SSO with Cloudflare.)
If you don't have all of the information you need to complete all the fields on this screen, you can be redirected to the Virtuous SSO screen where you will see the "Save and Continue" button will show as "Configure SSO."
You will also be notified that SSO is not fully enabled yet. To complete enabling, select "Configure SSO."
Once you complete the sync, WorkOS will ask you to test your sign-in. From there, go into the Virtuous app and enter the email address associated with your provider. You will be redirected to your provider to fill out your other credentials. After you enter them correctly, you're in!
A Few Other Notes
- If you forget your password, you will need to go through your provider to reset.
- Your login credentials should also work for the Virtuous Connect app.
- Users will still need to be invited to Virtuous before they can log in using credentials associated with your provider. Be sure to invite them with the email address associated with your primary domain and provider.
Identity Providers You Can Use
- AD FS SAML
- ADP OIDC
- Auth0 SAML
- Azure AD SAML
- CAS SAML
- ClassLink SAML
- Cloudflare SAML
- CyberArk SAML
- Duo SAML
- Generic SAML
- Google OAuth
- Google SAML
- JumpCloud SAML
- Keycloak SAML
- LastPass SAML
- Microsoft OAuth
- miniOrange SAML
- NetIQ SAML
- Okta SAML
- OneLogin SAML
- OpenID Connect
- Oracle SAML
- PingFederate SAML
- PingOne SAML
- Shibboleth Unsolicited SAML
- Shibboleth Generic SAML
- SimpleSAMLphp SAML
- VMware Workspace One SAML
Comments
0 comments
Article is closed for comments.