Common Scenarios
Single Sign On (SSO)

User portal SSO guide

19min

User portal

Here is an example of a subdomain for our user portal with a brief explanation of its benefits, how to access it and how to get required data. For more detailed information, you can refer here. Any identity provider for (end-user)user portal SSO login can be configured via our platform under:

Customers-> Customer Accounts -> Single Sign On tab Once any identity provider is configured, users can log in via SSO on our user portal: users.licensespring.com

Users of our Enterprise plan can access the user portal via: {company_code}.users.licensespring.com In this case, it's not necessary to use the company code for login to user portal; only the username and password are required. For SSO login, only the customer account code is needed, as the company code is automatically retrieved.

However, as stated below, during the SSO configuration process, the format required is: company_code-customer_account_code for user portal. Below is a guide on how to set up each identity provider. Note: You can use only one provider at time, if you wish to switch to another, first delete old one then follow our setup guide to add specific new provider.

Set Up Google OAuth 2.0

  1. Create a developer account with Google if you haven't already.
  2. Create a New Project:
    • Click on the project dropdown at the top left.
    • Select "New Project".
    • Name your project (e.g., Google) and click "Create".
    • Document image
      
  3. Set Up OAuth Consent Screen:
    • Navigate to the "OAuth consent screen" tab.
    • Select "External" and click "Create".
    • Fill in the required fields such as "Application name" and "User support email".
    • Configure Scopes: Include Scopes like:
    • .../auth/userinfo.email,
    • .../auth/userinfo.profile,
    • openid
    • Continue to Test users settings and save.
    • add test users inside the application:
    • Document image
      
  4. Create OAuth 2.0 Credentials:
  5. Save Your Credentials:
    • Once created, you will be provided with a Client ID and Client Secret.
    • Copy and save these credentials. You will need them to configure your application to use Google SSO inside the platform.



Document image

Document image


If the Account Linking and Verification toggle is ON, then when you create a user, they must verify their email before they can log in. If the toggle is OFF, email verification is not required for the user to log in. Note: redirect_uri is only relevant for applications that use the SDK and allow licensed users to use SSO instead of email/password for authentication. Otherwise, everything else redirects back to the user portal.

Instructions for Configuring Auth0 SSO

  1. Click on Applications, then select Create Application.
  2. In the Create Application dialog box, provide a name for your application (e.g., My App).
  3. Choose Single Page Web Applications as the application type.
  4. Click the Create button.

Create Test user

  1. Navigate to the left navigation bar and select User Management.
  2. Click on Users.
  3. Choose + Create Your First User. Alternatively, if this is not your initial user, select + Create User.
  4. Within the Create user dialog box, input the user's email and password.
  5. Click the Save button.

Configure SAML Settings

  1. Access the left navigation bar and click on Applications.
  2. Select the name of the application you previously created.
  3. Go to the Addons tab.
  4. Activate the SAML2 Web App option.
  5. Within the Addon: SAML2 Web App dialog box, navigate to the Settings tab.
  6. For the Application Callback URL, input:
  1. Under Settings, input the following and leave it empty: {}
  2. For minimal Settings to configure email as the NameID, you can use the following configuration:
  • { "mappings": { "email": "Email" }, "nameIdentifierProbes": [ "Email" ] }
  1. (Optional) Choose Debug, then log in as the test user you created to confirm that the

configuration works.

  1. Choose Enable, and then choose Save.
  2. In the Addon: SAML2 Web App dialog box, on the Usage tab, find Identity Provider Metadata. Then do either of the following:
  3. Choose download to download the .xml metadata file.



Document image


Document image


Important: for SAML we use the Name ID format emailaddress.

Upload the downloaded .xml file by choosing SAML for auth0 and confirm to add it.

If the Account Linking and Verification toggle is ON, then when you create a user, they must verify their email before they can log in.

If the toggle is OFF, email verification is not required for the user to log in.

Note: redirect_uri is only relevant for applications that use the SDK and allow licensed users to use SSO instead of email/password for authentication.

Otherwise, everything else redirects back to the user portal.



Okta SSO instructions

  1. In the navigation menu, expand Applications, and then choose Applications.
  2. Choose Create App Integration.
  3. In the Create a new app integration menu, choose SAML 2.0 as the Sign-in method.
  4. Choose Next.
  5. On the Create SAML Integration page, under General Settings, enter a name for your app.
  6. Choose Next.

Configure SAML Integration

Document image

  1. For all other settings on the page, leave them as their default values or set them according to your preferences.
  2. Choose Next.
  3. Choose a feedback response for Okta Support.
  4. Choose Finish.

Assign a User

  1. On the Assignments tab for your Okta app, for Assign, choose Assign to People.
  2. Choose Assign next to the user that you want to assign. Note: If this is a new account, the only option available is to choose yourself (the admin) as the user.
  3. (Optional) For User Name, enter a user name, or leave it as the user's email address, if you want.
  4. Choose Save and Go Back. Your user is assigned.
  5. Choose Done.

Get the IdP Metadata

  1. On the Sign On tab for your Okta app, find the Identity Provider metadata hyperlink.
  2. Right-click the hyperlink, and then copy the URL.
    • If not found then click View SAML setup instructions and save the value from Provide the following IDP metadata to your SP provider into an .xml file.
Document image




Important: for SAML we use the Name ID format emailaddress.

Upload the downloaded .xml file by choosing SAML for auth0 and confirm to add it.

If the Account Linking and Verification toggle is ON, then when you create a user, they must verify their email before they can log in.

If the toggle is OFF, email verification is not required for the user to log in.

Note: redirect_uri is only relevant for applications that use the SDK and allow licensed users to use SSO instead of email/password for authentication.

Otherwise, everything else redirects back to the user portal.

Azure active directory SSO instructions

  1. Access Azure Portal and choose Enterprise Applications.
  2. Add an enterprise application.
  3. Create your own application, input name, and select non-gallery option.
  4. Opt for single sign-on > SAML.
  5. Set up single sign on
  6. Edit Basic SAML Configuration:
  7. Save and close the settings.
  8. Under Attributes & Claims please set if not selected Unique User Identifier(Name ID) to user.mail:



Document image

  1. We are using the email as the NameID. If the UserPrincipalName (UPN) is not the user’s
  • primary email in the platform, it should be updated accordingly. This is important as some users may have multiple email aliases, which could result in pulling the incorrect email.
  1. Download Federation Metadata XML.
  2. Provide us with your provider's name and the downloaded metadata in .xml format.



Document image


Error: A common Azure DB provider SSO error is shown in the screenshot below:

Document image

  1. In the Azure Active Directory Admin Center, select your app and then search for and select the application to which you want to assign the user account.
  2. In the left pane select Users and Groups and then select Add User/Group.
Document image

Document image


3. On the Add Assignment pane, select None Selected under Users and Groups

4. Search for and select the user that you want to assign to the application, select Select

5. On the Add Assignment, select Assign at the bottom of the pane

6. When all steps are completed, user can normally sign in to account using SSO.

Document image




Important: for SAML we use the Name ID format emailaddress.

Upload the downloaded .xml file by choosing SAML for auth0 and confirm to add it.

If the Account Linking and Verification toggle is ON, then when you create a user, they must verify their email before they can log in.

If the toggle is OFF, email verification is not required for the user to log in.

Note: redirect_uri is only relevant for applications that use the SDK and allow licensed users to use SSO instead of email/password for authentication.

Otherwise, everything else redirects back to the user portal.

Document image


Apple SSO instructions

Set Up Apple

  1. Go to the Apple Developer Console: Visit Apple Developer Console.
  2. Create an Apple Developer Account:
    • If you don't have an Apple Developer account, you will need to create one and enroll in the Apple Developer Program.
  3. Create a New App ID:
    • Under Identifiers, click the "+" button to create a new App ID.
    • Choose "App IDs" and click "Continue".
    • Enter a description and a bundle ID (e.g., keycloak)
    • Under "Capabilities", enable "Sign in with Apple".
    • Click "Continue" and then "Register".
    • Enable as a primary App ID on configuration of Sign in with Apple.
    • Document image
      
  4. Create a Service ID:
  5. Create a Key for Apple Sign-In:
    • Navigate to "Keys" and click the "+" button to create a new key.
    • Enable "Sign in with Apple" and click "Configure".
    • Select the Primary App ID and click "Save".
    • Click "Continue" and then "Register".
    • Download the key file it will have a .p8 extension) and save it securely. You will not be able to download it again.
  6. Get Your Team ID and Key ID
  7. Note down your Team ID from your Apple Developer account.
  8. Note down the Key ID from the key details.
  9. Note down service identifier as mentioned before in step 4. : keycloak-service
  10. Have your key file ready to upload it on platform.

Setup Apple SSO with above credentials on Licensespring platform.

Note: When you create new APP ID, it may take up to few hours to apply changes.

Document image


If the Account Linking and Verification toggle is ON, then when you create a user, they must verify their email before they can log in. If the toggle is OFF, email verification is not required for the user to log in. Note: redirect_uri is only relevant for applications that use the SDK and allow licensed users to use SSO instead of email/password for authentication. Otherwise, everything else redirects back to the user portal.

Document image




Updated 14 Jan 2025
Doc contributor
Did this page help you?