Vendor Platform SSO
The LicenseSpring Vendor Platform supports Single Sign-On (SSO) to allow internal users— such as administrators, developers, and support teams — to securely access the management dashboard using their organization's identity provider (IdP). By integrating SSO, vendors can enforce centralized authentication policies and streamline access control across their team.
This section provides a step-by-step guide to configure SSO within the Vendor Platform. The process includes registering your SSO provider, configuring SAML or OIDC settings, and verifying the connection. Once enabled, users will be able to authenticate via your IdP using their organizational credentials.
To configure Single Sign-On (SSO) for your organization, you must first navigate to the appropriate section within the LicenseSpring Vendor Platform. This is where you can add and manage your identity provider (IdP) settings.
Follow the steps below to access the SSO configuration view:
- Log in to the Vendor Platform
- Navigate to Organization Settings
- From the sidebar menu, click on “Settings”.
- This section contains configuration options that apply across your entire LicenseSpring account, including access control.
- Select the “SSO Settings” Tab
- Within the Settings view, select the “SSO Settings” tab.
- This view allows you to add a new SSO provider , and view current authentication settings.
- Click “Add Provider”
- To begin the integration process, click on the “Add SSO Provider” button.
- You will be prompted to enter details based on your IdP’s protocol (SAML or OIDC).
If you do not see the “SSO Settings” tab, ensure that you have the necessary admin privileges or contact your LicenseSpring account manager.

Depending on your selected Identity Provider, you will have to submit following informations:
- Name and .xml provider metadata file for SAML providers.
- Name, Client ID and Client secret for Google identity provider.
- Service ID, Key ID, Team ID and .p8 key file for Apple identity provider.
Check Create new platform user if it does not exist already if you want to allow all users from your identity provider to login to the LicenseSpring platform. In that case for every new logged in user, LicenseSpring will create a new vendor application user for your account.
Instructions on how to register your application to acquire required informations are described below.
You will need Company code to succesfully register your application in your identity provider dashboard. To find your company code, follow the next steps:
- Inside LicenseSpring vendor platform navigate to Settings--> Preferences
- Pay attention to the Company code field. In this case Company code is DSE2

Before setting up a social IdP, it's necessary to register your application with the respective IdP to acquire a client ID and client secret.
- Opt for the external User Type and proceed to create it.
- Provide app information, app domain (optional), and developer contact details.
- Save and move forward.
- Configure Scopes:
- Include Scopes like .../auth/userinfo.email, .../auth/userinfo.profile, openid.
- Update settings and save.
- Continue to Test users settings and save.
- Create credentials > OAuth client ID.
- Select web application type, name your OAuth 2.0 client.
- Add URIs to authorized JavaScript origins and authorized redirect URIs. Authorized JavaScript origins: https://auth.licensespring.com Authorized redirect URIs: https://auth.licensespring.com/realms/platform/broker/{COMPANY_CODE}/endpoint
- Create and note down your Client ID and your Client Secret.
- Go back to Add SSO Provider form in the LicenseSpring vendor platform and finish the setup.
- Create an Apple Developer Account:
- If you don't have an Apple Developer account, you will need to create one and enroll in the Apple Developer Program.
- Create a New App ID:
- Navigate to "Certificates, Identifiers & Profiles".
- Under Identifiers, click the "+" button to create a new App ID.
- Choose "App IDs" and click "Continue".
- Enter a description and a bundle ID (e.g., keycloak)
- Under "Capabilities", enable "Sign in with Apple".
- Click "Continue" and then "Register".
- Create a Service ID:
- Still under "Identifiers", click the "+" button to create a new Service ID.
- Select "Service IDs" and click "Continue".
- Enter a description and an identifier (e.g., keycloak-service)
- Click "Continue" and then "Register".
- After creating the Service ID, click on it to edit it.
- Enable "Sign in with Apple" and configure the redirect URI: https://auth.lcensespring.com/realms/platfrom/broker/{COMPANY_CODE}/endpoint
- Add the primary App ID created earlier as the Primary App ID.
- Click "Save".
- Create a Key for Apple Sign-In:
- Navigate to "Keys" and click the "+" button to create a new key.
- Enable "Sign in with Apple" and click "Configure".
- Select the Primary App ID and click "Save".
- Click "Continue" and then "Register".
- Download the key file it will have a .p8 extension) and save it securely. You will not be able to download it again.
- Get Your Team ID and Key ID:
- Note down your Team ID from your Apple Developer account.
- Note down the Key ID from the key details.
- Note down service identifier as mentioned before ins step 4. : keycloak-service
- Have your key file ready to upload it on platform.
- Go back to Add SSO Provider form in the LicenseSpring vendor platform and finish the setup.
To enable SAML IdP sign-in for your app users:
- Follow your SAML identity provider's instructions to add a relying party or application for your SAML 2.0 IdP.
- Configure the assertion consumer endpoint in your SAML identity provider to:
- https://auth.licensespring.com/realms/platform/broker/{COMPANY_CODE}/endpoint
- Existing configs with legacy prefixed (DO NOT USE FOR NEW CONFIGS): https://{_domain_name_}.auth.{_region_}.amazoncognito.com/saml2/idpresponse
- Some SAML IdPs might require the SP urn / Audience URI / SP Entity ID:
- Use https://auth.licensespring.com/realms/platform
- Existing configs with legacy prefixed (DO NOT USE FOR NEW CONFIGS): urn:amazon:cognito:sp:{_user_pool_id}
- Configure your SAML IdP to provide an email value (claim) in the SAML assertion.
- Support SAML 2.0 federation with post-binding endpoints. This ensures direct receipt of SAML responses via a user agent, eliminating the need for retrieval and parsing.
- Go back to Add SSO Provider form in the LicenseSpring vendor platform and finish the setup.
- Add an enterprise application.
- Create your own application, input name, and select non-gallery option.
- Opt for single sign-on > SAML.
- Edit Basic SAML Configuration:
- Set Identifier as https://auth.licensespring.com/realms/platform
- Existing configs with legacy prefixed (DO NOT USE FOR NEW CONFIGS): urn:amazon:cognito:sp:{_user_pool_id_}
- Configure Reply URL as https://auth.licensespring.com/realms/platform/broker/{COMPANY_CODE}/endpoint
- Existing configs with legacy prefixed (DO NOT USE FOR NEW CONFIGS): https://{_domain_name_}.auth.{_region_}.amazoncognito.com/saml2/idpresponse
- Save and close the settings.
- Download Federation Metadata XML.
- Go back to Add SSO Provider form in the LicenseSpring vendor platform and finish the setup.
Error: A common Azure DB provider SSO error is shown in the screenshot below:

To resolve this error, follow these steps:
- In the Azure Active Directory Admin Center, select your app and then search for and select the application to which you want to assign the user account.
- In the left pane select Users and Groups and then select Add User/Group.


3. On the Add Assignment pane, select None Selected under Users and Groups 4. Search for and select the user that you want to assign to the application, select Select 5. On the Add Assignment, select Assign at the bottom of the pane 6. When all steps are completed, user can normally sign in to account using SSO

Create an Auth0 Application
- Access the Auth0 website dashboard.
- Click on Applications, then select Create Application.
- In the Create Application dialog box, provide a name for your application (e.g., My App).
- Choose Single Page Web Applications as the application type.
- Click the Create button.
Create a Test User
- Navigate to the left navigation bar and select User Management.
- Click on Users.
- Choose + Create Your First User. Alternatively, if this is not your initial user, select + Create User.
- Within the Create user dialog box, input the user's email and password.
- Click the Save button.
Configure SAML Settings
- Access the left navigation bar and click on Applications.
- Select the name of the application you previously created.
- Go to the Addons tab.
- Activate the SAML2 Web App option.
- Within the Addon: SAML2 Web App dialog box, navigate to the Settings tab.
- For the Application Callback URL, input https://auth.licensespring.com/realms/platform/broker/{COMPANY_CODE}/endpoint
- Please substitute company code with the appropriate value from platform for your company_code, under platform settings.
- Existing configs with legacy prefixed (DO NOT USE FOR NEW CONFIGS): https://_domain_name_.auth._region_.amazoncognito.com/saml2/idpresponse
- Under Settings, input the following:
- No need to add anything, it can be left as is (" {} ").
- Replace _user_pool_id_ with the value from your SSO settings.
- Existing configs with legacy prefixed (DO NOT USE FOR NEW CONFIGS): { "audience": "urn:amazon:cognito:sp:_user_pool_id_", "mappings": { "email": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress" }, "nameIdentifierFormat": "urn:oasis:names:tc:SAML:2.0:nameid-format:persistent" }
- (Optional) Choose Debug, then log in as the test user you created to confirm that the configuration works.
- Choose Enable, and then choose Save.
Get the IdP Metadata
- In the Addon: SAML2 Web App dialog box, on the Usage tab, find Identity Provider Metadata. Then do either of the following:
- Choose download to download the .xml metadata file.
- Go back to Add SSO Provider form in the LicenseSpring vendor platform and finish the setup.
Create a SAML App
- Open the Okta Developer Console.
- In the navigation menu, expand Applications, and then choose Applications.
- Choose Create App Integration.
- In the Create a new app integration menu, choose SAML 2.0 as the Sign-in method.
- Choose Next.
Configure SAML Integration
- On the Create SAML Integration page, under General Settings, enter a name for your app.
- Choose Next.
- Under GENERAL, for Single sign on URL, enter https://auth.licensespring.com/realms/platform/broker/{COMPANY_CODE}/endpoint
- Existing configs with legacy prefixed (DO NOT USE FOR NEW CONFIGS): https://{domain_name}.auth.{region}.amazoncognito.com/saml2/idpresponse
- For Audience URI (SP Entity ID), enter https://auth.licensespring.com/realms/platform/broker/{COMPANY_CODE}/endpoint
- Existing configs with legacy prefixed (DO NOT USE FOR NEW CONFIGS): urn:amazon:cognito:sp:{user_pool_id}
- Under ATTRIBUTE STATEMENTS (OPTIONAL), add a statement with the following information:
- For Name, enter the SAML attribute name http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
- For Value, enter user.email.
- For all other settings on the page, leave them as their default values or set them according to your preferences.
- Choose Next.
- Choose a feedback response for Okta Support.
- Choose Finish.
Assign a User
- On the Assignments tab for your Okta app, for Assign, choose Assign to People.
- Choose Assign next to the user that you want to assign. Note: If this is a new account, the only option available is to choose yourself (the admin) as the user.
- (Optional) For User Name, enter a user name, or leave it as the user's email address, if you want.
- Choose Save and Go Back. Your user is assigned.
- Choose Done.
Get the IdP Metadata
- On the Sign On tab for your Okta app, find the Identity Provider metadata hyperlink.
- Right-click the hyperlink, and then copy the URL.
- If not found then click View SAML setup instructions and save the value from Provide the following IDP metadata to your SP provider into an xml file.
- Go back to Add SSO Provider form in the LicenseSpring vendor platform and finish the setup.
Once you have succesfully added your on identity provider to the LicenseSpring vendor platform SSO settings, you can continue logging in to the platform.
Return to the LicenseSpring login page and locate and click on Change login method, then SSO.

- A prompt will ask for the company code. Here, enter your Company code extracted in the previous steps.

If you have added the provider correctly and there were not errors during configuration step, you should be logged in to your company account.
If you require assistance or have custom SSO requirements, please contact LicenseSpring Support.