How SSO works
When SSO is configured for your account, team members with email addresses from your verified domain are automatically redirected to your organization’s identity provider when logging into the Privy dashboard. After successful authentication, they are redirected back to the dashboard with full access based on their assigned role. SSO authentication integrates seamlessly with Privy’s role-based access control. Learn more about team roles.Supported identity providers
Privy’s supports all major identity providers, including:- Okta
- Microsoft Entra ID (formerly Azure AD)
- Google Workspace
- OneLogin
- JumpCloud
- Rippling
- And any SAML 2.0 compatible identity provider
Prerequisites
Before setting up SSO, ensure:- Your account has Admin access to the Privy dashboard
- Your organization has an active identity provider
- Your organization’s IT team can configure SAML applications
- Your team members use email addresses from a domain you control
Setting up SSO
Domain verification
Domain verification ensures that only authorized members of your organization can use SSO to access your Privy account.- Navigate to the Team page in your dashboard
- Click on the Authentication tab
- In the Single-Sign-On (SSO) section, enter the domain you want to verify (e.g.,
yourcompany.com) - Add the provided TXT record to your domain’s DNS configuration
- Wait for DNS propagation (typically 15 minutes to one hour)
You can verify multiple domains for your account. All verified domains will use the same SSO
configuration and identity provider.
Identity provider configuration
After verifying your domain, configure your identity provider to communicate with Privy:- On the Authentication tab, click Configure identity provider
- Click Open setup portal to access the configuration interface
- In the portal, select your identity provider from the list
- Follow the provider-specific instructions to create a new SAML application
- Copy the ACS URL and Entity ID from the portal into your identity provider’s configuration
- Download the metadata file or copy the SSO URL and certificate from your identity provider
- Upload or paste these values in the configuration portal
- Test the connection to ensure it’s working correctly
The configuration portal provides step-by-step instructions tailored to your specific identity
provider. Follow these carefully to ensure proper configuration.
Using SSO
Once SSO is configured and active, team members can sign in using SSO:For team members
- Go to the Privy dashboard login page
- Enter your work email address
- You will be automatically redirected to your organization’s identity provider
- Authenticate using your corporate credentials
- You will be redirected back to the Privy dashboard
For admins
As an Admin, you can still access the dashboard using your original login method if needed. This ensures you can always access your account even if there are issues with the SSO configuration.Managing SSO
Adding additional domains
You can add multiple domains to your SSO configuration:- Go to the Authentication tab on the Team page
- Enter the new domain and press Add
- Follow the domain verification process described above
Removing domains
To remove a domain from your SSO configuration:- Navigate to the Authentication tab
- Find the domain you want to remove
- Click “Delete” in the domain’s dropdown menu
- Confirm the removal
Removing your last verified domain will disable SSO for your account. Team members will need to
use their original login method to access the dashboard.
Updating identity provider settings
To update your identity provider configuration:- Navigate to the Team page
- Click on the Authentication tab
- In the SSO configuration section, click Manage configuration
- Make your changes in the configuration portal
- Test the connection to verify the changes
Security considerations
Automatic account provisioning
By default, automatic account provisioning is disabled. This means only team members who have been explicitly invited can log in via SSO. To enable automatic provisioning:- Navigate to the Team page
- Click on the Authentication tab
- In the Single-Sign-On (SSO) section, toggle on “Enable automatic account provisioning”
Session management
SSO sessions in the Privy dashboard are independent of your identity provider’s sessions. Logging out of your identity provider does not automatically log you out of the Privy dashboard.Troubleshooting
Domain verification fails
If domain verification is not working:- Verify the TXT record was added correctly to your DNS configuration
- Wait longer for DNS propagation (can take up to 24 hours in some cases)
- Check for typos in the verification token
- Ensure the TXT record is added to the root domain, not a subdomain
Users cannot sign in via SSO
If team members are having trouble signing in:- Verify the domain is properly verified in the Privy dashboard
- Ensure the identity provider connection is marked as active
- Check that the user’s email domain matches a verified domain
- Test the connection in the configuration portal
- Verify the user exists in your identity provider
Connection not active
If your SSO connection is not showing as active:- Complete all steps in the identity provider configuration
- Upload or enter all required SAML metadata
- Test the connection in the configuration portal
For technical issues with SSO configuration, please reach out.
Best practices
Planning your rollout
- Communicate changes: Notify your team before enabling SSO about the new login process
- Document backup access: Ensure team members know how to request access if they have login issues
Ongoing management
- Review regularly: Periodically review which domains are verified and ensure they’re still needed
- Monitor new users: When new SSO users join, verify they have the appropriate role assigned
- Keep contact information updated: Ensure your identity provider’s administrator contact information is current
Security recommendations
- Enable MFA at the identity provider: Require multi-factor authentication in your identity provider for an additional security layer
- Use the principle of least privilege: Assign the minimum role necessary when promoting SSO users from Viewer
- Regular access reviews: Audit your team members and their roles periodically

