Single Sign‑On (SSO) for Enterprise
Enterprise plan customers can configure SSO using SAML 2.0 or OIDC (OpenID Connect).
Supported SSO providers
- Okta
- Azure AD (Microsoft Entra ID)
- Google Workspace
- Auth0
- Ping Identity
- Any SAML 2.0 or OIDC compliant IdP
SAML 2.0 configuration
- Go to Company Settings → SSO tab.
- Select SAML 2.0.
- Enter your IdP metadata URL or upload metadata XML file.
- Certorix provides:
- Entity ID:
https://certorix.com/saml/metadata - ACS URL:
https://certorix.com/saml/acs - Name ID format:
urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
- Entity ID:
- Map attributes:
email→ SAML attribute (e.g.,http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress)firstName→ optionallastName→ optional
- Click Test SAML connection to verify.
- Save configuration.
OIDC configuration
- Select OpenID Connect.
- Enter your Issuer URL (e.g.,
https://login.microsoftonline.com/{tenant}/v2.0). - Enter Client ID and Client Secret from your IdP.
- Set Authorized redirect URI:
https://certorix.com/oidc/callback. - Save configuration.
Enforcing SSO for all users
Toggle Require SSO for all logins to ON. When enabled:
- Users cannot log in with email/password.
- Google OAuth is disabled.
- API tokens still work (for automation).
- Admins can still use backup login (email/password) via a special URL (
/admin/login) to avoid lockout.
Just‑In‑Time (JIT) provisioning
When enabled, users logging in via SSO for the first time are automatically created in Certorix with the role specified in the SAML/OIDC attribute (role claim).
Default role for new JIT users: Viewer.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article