Enterprise SSO Setup
GuidesEnterprise SSO Setup
Priiism supports enterprise single sign-on (SSO) at the organization level. Connect your company’s identity provider — Okta, Microsoft Active Directory, Google Workspace, or any SAML 2.0 / OIDC provider — so team members sign in with their existing corporate credentials.
Overview
Enterprise SSO in Priiism uses organization-level identity configuration. When SSO is enabled:
- Team members sign in with their corporate credentials (no separate Priiism password)
- New users are auto-provisioned on first login (JIT provisioning)
- IdP group memberships map to Priiism org roles automatically
- Home Realm Discovery routes users to the correct IdP based on their email domain
Supported Protocols
| Protocol | Providers |
|---|---|
| SAML 2.0 | Okta, Microsoft ADFS, OneLogin, PingFederate, generic SAML |
| OIDC | Azure AD (Entra ID), Google Workspace, generic OIDC |
Prerequisites
- A Priiism organization (Pro or Enterprise plan)
- Owner or Admin role in the organization
- Admin access to your identity provider (Okta, Azure AD, etc.)
- A domain you control for DNS verification
Step 1: Verify Your Domain
Domain verification proves you own the email domain used by your team. This is required before setting up SSO.
-
Go to Org Settings (click your org name in the sidebar, then Settings)
-
Navigate to the Identity tab
-
Under Verified Domains, click Add Domain
-
Enter your domain (e.g.,
yourcompany.com) -
Priiism generates a DNS TXT record:
Host: _viiibin-verify Value: viiibin-verify-{token} -
Add this TXT record in your DNS provider (e.g., Route 53, GoDaddy, Namecheap)
-
Click Verify — DNS propagation can take up to 48 hours, but usually completes within minutes
-
Once verified, the domain shows a green checkmark
You can verify multiple domains if your organization uses more than one email domain.
Step 2: Set Up Okta SSO (SAML 2.0)
In Okta
- Log in to your Okta admin console
- Go to Applications > Create App Integration
- Select SAML 2.0 and click Next
- Configure the SAML integration:
- Single sign-on URL:
https://auth.priiism.ai/login/callback?connection={connection-name}(Priiism provides this after you create the connection) - Audience URI (SP Entity ID):
urn:auth0:priiism:{connection-name} - Name ID format: EmailAddress
- Application username: Email
- Single sign-on URL:
- Under Attribute Statements, add:
email->user.emailname->user.firstName + " " + user.lastName
- Under Group Attribute Statements, add:
- Name:
groups| Filter: Matches regex.*
- Name:
- Click Finish and note the IdP Metadata URL (under Sign On tab > SAML Signing Certificates > Actions > View IdP metadata)
- Assign users or groups to the application
In Priiism
- Go to Org Settings > Identity
- Under SSO Connections, click Add Connection
- Select SAML 2.0
- Enter a connection name (e.g.,
okta-yourcompany) - Paste the IdP Metadata URL from Okta
- Click Create — Priiism fetches the metadata and configures the connection
- Toggle the connection to Enabled
Configure Role Mappings
After creating the connection, set up role mappings to automatically assign org roles based on Okta group membership:
-
Under the connection settings, click Role Mappings
-
Add mappings:
IdP Group Priiism Org Role AdminsOwner EngineeringAdmin ProductMember StakeholdersViewer -
Users who don’t match any mapping get the default role (Member)
Step 3: Set Up Microsoft AD SSO (OIDC)
In Azure AD (Entra ID)
- Log in to the Azure Portal
- Go to Microsoft Entra ID > App registrations > New registration
- Configure:
- Name: Priiism SSO
- Supported account types: Accounts in this organizational directory only
- Redirect URI:
https://auth.priiism.ai/login/callback(Web)
- After registration, note the Application (client) ID and Directory (tenant) ID
- Go to Certificates & secrets > New client secret — note the secret value
- Go to Token configuration > Add optional claim > Token type: ID > Add
email,given_name,family_name - Go to API permissions > Add
User.ReadandGroupMember.Read.All(if using group-based role mappings) - Grant admin consent for the permissions
In Priiism
- Go to Org Settings > Identity
- Under SSO Connections, click Add Connection
- Select OIDC
- Fill in:
- Connection name:
azure-ad-yourcompany - Tenant ID: Your Azure AD tenant ID
- Client ID: The application (client) ID from Azure
- Client Secret: The client secret value
- Connection name:
- Click Create
- Toggle the connection to Enabled
Configure Role Mappings
Set up role mappings from Azure AD groups:
-
Under the connection settings, click Role Mappings
-
Add mappings using Azure AD group Object IDs or display names:
Azure AD Group Priiism Org Role IT-AdminsOwner DevelopersAdmin All-StaffMember
Home Realm Discovery
Once SSO is configured and your domain is verified, Home Realm Discovery (HRD) automatically routes users to the correct identity provider based on their email domain.
How it works:
- A user visits the Priiism login page and enters their email
- Priiism checks the email domain against verified domains
- If the domain matches an organization with SSO enabled, the user is redirected to their IdP
- If no match, the user continues with standard email/password login
This means your team members never need to remember which login method to use — they just enter their email and are automatically sent to Okta, Azure AD, or whichever IdP your organization uses.
Google Workspace SSO
For organizations using Google Workspace:
- Verify your Google Workspace domain in Priiism
- Create an OIDC connection using your Google Workspace credentials
- Users with
@yourcompany.comemails will be routed to Google for authentication
Google Workspace SSO uses OAuth 2.0/OIDC, so no SAML configuration is needed.
Troubleshooting
Users can’t log in via SSO
- Verify the connection is Enabled in Org Settings > Identity
- Check that users are assigned to the application in your IdP (Okta/Azure AD)
- Confirm the domain is verified (green checkmark in Org Settings > Identity)
Role mappings not working
- Ensure group claims are being sent by your IdP (check the Group Attribute Statement in Okta or Token Configuration in Azure AD)
- Group names are case-sensitive —
Adminsis different fromadmins - Users must log out and log back in for role mapping changes to take effect
DNS verification stuck
- TXT records can take up to 48 hours to propagate
- Verify the record is set on the correct domain (not a subdomain)
- Use
dig TXT _viiibin-verify.yourcompany.comto check propagation
Next Steps
- Team Access & Permissions — Understand org and project role hierarchies
- Healthcare Authentication — SSO patterns for healthcare organizations
- Set Up Authentication — Per-project auth for end users of your apps