Single Sign-On (SSO) allows users to access iplicit using a single set of login credentials, managed through your organisation's Identity Provider (IdP), such as Azure AD, Google, or OneLogin.
This guide outlines the steps to:
Set up users in your SSO provider
Enable and configure SSO in iplicit
Link users to the SSO provider
Log in to iplicit via SSO
Step 1: Set Up the User in Your SSO Provider
Before configuring anything in iplicit, each user must first be added to your organisation’s SSO provider.
1. Log in to the SSO Provider’s Admin Portal
Access the admin console for your Identity Provider (e.g. Azure AD, OneLogin, or Google Workspace). Navigate to the user or directory management section.
2. Add the User
Click the “Add User” or “Create User” button.
Fill in the user’s details, including their name, email address, and any other required information.
Assign the user to the appropriate groups or roles to control access to applications and services.
3. Configure the User’s SSO Settings
Once the user has been created, go to the section where SSO settings are managed for individual users (the location varies depending on the provider).
If required, generate a unique SSO token, Object ID, or user identifier.
Record or copy this identifier, as it may be needed later when linking the user in iplicit.
Provide the user with the necessary configuration information to complete their setup, such as:
The SSO provider login URL
Their unique SSO identifier or token
Any additional setup instructions specific to your organisation
This ensures the user is correctly set up and ready to authenticate via SSO once iplicit is configured.
Step 2: Enable SSO in iplicit
1. Access Environment Defaults
In iplicit, go to Environment Defaults. Search for Single Sign-On (SSO) section.
2. Enable your chosen SSO provider
Select the SSO provider you are using from the available list. Once selected, iplicit will display the necessary fields specific to that provider.
3. Complete the provider-specific fields
Depending on your provider, fill in the required information:
For Azure AD: Enter the Tenant ID.
For OneLogin: Enter the SSO Authority URL, Client ID, Client Secret, and a label.
For SAML2: Enter the SAML2 Metadata URL, Entity ID, and a label.
4. (Optional) Enforce login via SSO only
If you want to disable username/password logins, tick the "Enforce login via SSO" option.
Click Apply to confirm your changes.
Step 3: Link Users to the SSO Provider in iplicit
After enabling SSO, you must link each iplicit user to their corresponding identity in the SSO provider.
Option A: User-Side Linking
Users log into iplicit with their existing credentials.
Click their name in the top corner and select Security.
Under SSO Methods, select their provider and click Link.
The user will be redirected to authenticate via the SSO provider, completing the link.
Option B: Admin-Side Linking via SSO Link Wizard
Go to User Accounts.
From the user list, open the Actions menu and select SSO Link Wizard.
For Azure AD: Sign in as an admin and select users from the matched list.
For other providers (e.g. OneLogin, SAML2): Upload a CSV file with users’ email addresses and their SSO identifiers.
Click Apply to complete the linking process.
Step 4: Logging In via SSO
Once linked, users can log into iplicit using the SSO login option:
Go to https://login.iplicit.com.
Click the login button for their SSO provider (e.g. Microsoft, OneLogin).
Authenticate via the SSO provider.
If the user chooses, they can select the option to remember the device for 30 days.
For additional guidance check:
_______________________________________________________________________________________