Single Sign-On (SSO) allows users to access iplicit using a single set of login credentials, managed through your organisation's Identity Provider (IdP), such as Azure AD, Google, or OneLogin.

This guide outlines the steps to:

  • Set up users in your SSO provider

  • Enable and configure SSO in iplicit

  • Link users to the SSO provider

  • Log in to iplicit via SSO


Step 1: Set Up the User in Your SSO Provider

Before configuring anything in iplicit, each user must first be added to your organisation’s SSO provider.

1. Log in to the SSO Provider’s Admin Portal

Access the admin console for your Identity Provider (e.g. Azure AD, OneLogin, or Google Workspace). Navigate to the user or directory management section.

2. Add the User

Click the “Add User” or “Create User” button.
Fill in the user’s details, including their name, email address, and any other required information.
Assign the user to the appropriate groups or roles to control access to applications and services.

3. Configure the User’s SSO Settings

Once the user has been created, go to the section where SSO settings are managed for individual users (the location varies depending on the provider).
If required, generate a unique SSO token, Object ID, or user identifier.
Record or copy this identifier, as it may be needed later when linking the user in iplicit.

Provide the user with the necessary configuration information to complete their setup, such as:

  • The SSO provider login URL

  • Their unique SSO identifier or token

  • Any additional setup instructions specific to your organisation

This ensures the user is correctly set up and ready to authenticate via SSO once iplicit is configured.


Step 2: Enable SSO in iplicit

1. Access Environment Defaults

In iplicit, go to Environment Defaults. Search for Single Sign-On (SSO) section.

2. Enable your chosen SSO provider

Select the SSO provider you are using from the available list. Once selected, iplicit will display the necessary fields specific to that provider.

3. Complete the provider-specific fields

Depending on your provider, fill in the required information:

  • For Azure AD: Enter the Tenant ID.

  • For OneLogin: Enter the SSO Authority URL, Client ID, Client Secret, and a label.

  • For SAML2: Enter the SAML2 Metadata URL, Entity ID, and a label.

4. (Optional) Enforce login via SSO only

If you want to disable username/password logins, tick the "Enforce login via SSO" option.


Click Apply to confirm your changes.


Step 3: Link Users to the SSO Provider in iplicit

After enabling SSO, you must link each iplicit user to their corresponding identity in the SSO provider.

Option A: User-Side Linking

  • Users log into iplicit with their existing credentials.

  • Click their name in the top corner and select Security.

  • Under SSO Methods, select their provider and click Link.

  • The user will be redirected to authenticate via the SSO provider, completing the link.

Option B: Admin-Side Linking via SSO Link Wizard

  • Go to User Accounts.

  • From the user list, open the Actions menu and select SSO Link Wizard.

  • For Azure AD: Sign in as an admin and select users from the matched list.

  • For other providers (e.g. OneLogin, SAML2): Upload a CSV file with users’ email addresses and their SSO identifiers.

Click Apply to complete the linking process.


Step 4: Logging In via SSO

Once linked, users can log into iplicit using the SSO login option:

  1. Go to https://login.iplicit.com.

  2. Click the login button for their SSO provider (e.g. Microsoft, OneLogin).

  3. Authenticate via the SSO provider.

If the user chooses, they can select the option to remember the device for 30 days.


For additional guidance check: 


Customer search terms

_______________________________________________________________________________________