Identity & SSO
OrganizationIdentity & SSO
Connect your organization’s identity provider for single sign-on. Team members can log in with their corporate credentials instead of creating separate accounts.
The Identity & SSO page has three sections: Verified Domains, Enterprise Connections, and Role Mappings.
Verified Domains
Verify ownership of your email domain to enable SSO features like Home Realm Discovery (automatically routing users to your IdP based on their email).
Adding a Domain
- Enter your domain (e.g.,
yourcompany.com) - Click Add Domain
- You’ll receive a verification token — a DNS TXT record to add:
Type: TXT Name: _priiism-verify Value: viiibin-verify-{your-token} - Add this record in your DNS provider (e.g., Route 53, GoDaddy, Namecheap)
- Click Verify — DNS propagation can take up to 48 hours but usually completes within minutes
- Once verified, the domain shows a green checkmark
What Verified Domains Enable
- Home Realm Discovery — Users with your domain email are automatically routed to your IdP at login
- JIT Provisioning — New users from your domain are auto-provisioned on first login
- Domain trust — Proves you own the domain for security compliance
Enterprise Connections
Connect your identity provider so team members can log in with their existing corporate credentials.
Supported Protocols
| Protocol | Use Case |
|---|---|
| SAML 2.0 | Okta, OneLogin, PingFederate, generic SAML |
| OIDC | Azure AD, custom OIDC providers |
| Azure AD | Microsoft Entra ID (formerly Azure Active Directory) |
| Google Workspace | Google corporate accounts |
| Okta | Okta Workforce Identity |
Creating a Connection
- Click Add Connection
- Enter a name (e.g., “Okta Production”)
- Select the protocol (SAML, OIDC, Azure AD, Google Workspace, Okta)
- Optionally add a display name (shown on the login page)
- Click Create
After creation, you’ll need to configure the connection in your IdP. The exact steps depend on your provider — see the Enterprise SSO Setup Guide for Okta and Azure AD walkthroughs.
Enabling / Disabling
Toggle connections on or off without deleting them. Disabled connections won’t appear on the login page.
Role Mappings
Map groups from your identity provider to Priiism organization roles. When a user logs in via SSO, their IdP group memberships automatically determine their org role.
How It Works
- User logs in via your enterprise connection
- The IdP sends group claims (e.g., SAML attribute
groups: ["engineering", "admins"]) - Priiism checks your role mappings
- The user gets the highest matching role
Creating a Mapping
- Select the Connection (which IdP this mapping applies to)
- Enter the IdP Group name (must match exactly what your IdP sends — e.g.,
admins,engineering) - Select the Org Role to assign (admin, member, viewer)
- Click Add Mapping
Examples
| IdP Group | Org Role | Effect |
|---|---|---|
admins | Admin | Users in the “admins” IdP group become org admins |
developers | Member | Users in “developers” can create and edit projects |
executives | Viewer | Users in “executives” get read-only access |
Note: Role mappings only apply to users logging in via the mapped enterprise connection. Users invited directly (by email) keep their assigned role.