SSO
Configure SAML-based single sign-on so your team can log in with their existing identity provider.
Supported Providers
graph8 supports SAML 2.0 SSO with:
- Okta
- Azure AD (Microsoft Entra ID)
- OneLogin
- Google Workspace
- Any SAML 2.0–compliant identity provider
SSO is available on Enterprise plans.
Setup
Step 1: Gather graph8 SAML Details
- Go to Settings → SSO
- Copy the following values to use in your identity provider:
- ACS URL (Assertion Consumer Service)
- Entity ID (SP Entity ID)
- Login URL
Step 2: Configure Your Identity Provider
In your identity provider (Okta, Azure AD, etc.):
- Create a new SAML application
- Paste the ACS URL and Entity ID from graph8
- Configure attribute mapping:
- email — user’s email address (required)
- firstName — user’s first name
- lastName — user’s last name
- Download the IdP metadata XML or copy the:
- IdP SSO URL
- IdP Entity ID
- X.509 Certificate
Step 3: Complete Configuration in graph8
- Return to Settings → SSO
- Upload the IdP metadata XML, or manually enter:
- IdP SSO URL
- IdP Entity ID
- X.509 Certificate
- Click Save
- Click Test Connection to verify
Step 4: Enable SSO
Once the test connection succeeds:
- Toggle SSO to Enabled
- Choose the enforcement mode (see below)
- Save
Enforcement
Optional SSO
Users can log in with either SSO or email/password. This is useful during rollout.
Required SSO
All organization members must use SSO to log in. Email/password login is disabled.
- Admins can still use email/password as a fallback (to prevent lockout)
- New users are automatically prompted to use SSO on their first login
Enabling Enforcement
- Go to Settings → SSO
- Set enforcement to Required
- Notify your team about the change
- Save
Troubleshooting
Common Issues
“SAML response is invalid”
- Check that the ACS URL in your IdP matches the one shown in graph8
- Verify the X.509 certificate hasn’t expired
- Ensure the clock on your IdP server is synchronized (SAML is time-sensitive)
“User not found”
- The email in the SAML assertion must match a user’s email in graph8
- Verify the attribute mapping sends the correct email field
“Certificate error”
- Re-download the certificate from your IdP
- Upload the new certificate in graph8
- Some IdPs rotate certificates — check your IdP’s rotation schedule
Certificate Expiry
SAML certificates expire periodically (typically every 1–3 years). When your certificate approaches expiry:
- Generate a new certificate in your IdP
- Upload the new certificate in Settings → SSO
- Test the connection
- The old certificate is replaced
Frequently Asked Questions
Can I use multiple identity providers?
Currently, one IdP per organization. All users must authenticate through the same provider.
What happens if SSO goes down?
Admins retain email/password access as a fallback. Contact support for emergency access if all admins are locked out.
Do new users need to be manually invited?
With SSO enabled, new users can be auto-provisioned on first login. Their role defaults to Member unless configured otherwise.
Does SSO work with two-factor authentication?
Yes. 2FA from your identity provider is enforced during the SSO login flow. graph8’s built-in 2FA is bypassed when SSO is active.
Tip: Test SSO with a small group before enforcing it organization-wide.