Personyze Wiki Personyze Wiki docs
Open Personyze
Setup

Set up a single sign-on (SSO) client

Set up Single Sign-On (SSO) so your team accesses Personyze through your existing identity provider — Auth0, Okta, OneLogin, or any SAML 2.0 IdP. Centralizes user provisioning and deprovisioning.

Updated 4 days ago 2 min read
A
by Admin

Single Sign-On (SSO) lets your team access Personyze using your organization’s existing identity provider — Auth0, Okta, OneLogin, Microsoft Entra ID (Azure AD), Google Workspace, etc. Instead of managing a separate set of Personyze credentials, your IdP becomes the source of truth: when you disable a user there, their Personyze access is gone too.

When SSO makes sense

  • Enterprise teams with central IT-managed user directories.
  • Compliance-driven environments where access provisioning/deprovisioning must flow through a single identity system.
  • Larger Personyze deployments with 5+ users where individual password management becomes overhead.
  • Organizations using MFA universally — SSO inherits your IdP’s MFA enforcement, so Personyze automatically requires MFA without separate configuration.

How SSO works in Personyze

Personyze acts as a SAML 2.0 service provider. Your IdP issues SAML assertions when users authenticate, Personyze accepts them, and a Personyze user is provisioned (or matched, if pre-existing) based on the email in the assertion. After the initial setup:

  1. Users navigate to your Personyze login page and click Sign in with SSO.
  2. They’re redirected to your IdP for authentication.
  3. On success, the IdP returns a signed SAML assertion to Personyze.
  4. Personyze logs them in, creating the user account on first login if needed.

Managing SSO clients

SSO is configured per Personyze account in Admin Console → Settings → Integrations → Single Sign On. You can have multiple SSO clients configured if you support multiple IdPs (rare, but useful for parent/subsidiary organizations).

Provider-specific setup guides

Each major IdP has its own UI for creating a SAML application and exchanging metadata with Personyze. Step-by-step screenshots for the most common providers are below — pick yours and follow the matching section.

  • Enabling SSO using Auth0
  • Enabling SSO using Okta
  • Enabling SSO using OneLogin
  • Enabling SSO using Xecurify (any other SAML 2.0 provider — generic flow)

Common issues

  • “Invalid SAML response.” Usually a clock skew between Personyze and your IdP — assertions have a tight validity window. Sync NTP on both sides.
  • “User not provisioned.” The email in the SAML assertion doesn’t match an existing Personyze user, and auto-provisioning is disabled. Either pre-create the user in Personyze or enable just-in-time provisioning.
  • Login loops back to IdP. The SAML response is reaching Personyze but failing signature validation. Verify the IdP’s signing certificate is correctly uploaded to Personyze’s SSO settings — re-export it from the IdP and re-paste if needed.
  • SSO works in test, fails in production. Production typically uses a different ACS URL (Assertion Consumer Service) than test environments. Make sure the SAML application’s reply URL matches the production Personyze ACS.

Enabling SSO using Auth0

Enabling SSO using Auth0 Enabling SSO using Auth0 Enabling SSO using Auth0 Enabling SSO using Auth0 Enabling SSO using Auth0

Enabling SSO using OktaSet up a single sign-on (SSO) client — screenshot 8 Set up a single sign-on (SSO) client — screenshot 9 Set up a single sign-on (SSO) client — screenshot 10 Set up a single sign-on (SSO) client — screenshot 11 Set up a single sign-on (SSO) client — screenshot 12 Set up a single sign-on (SSO) client — screenshot 13 Set up a single sign-on (SSO) client — screenshot 14 Set up a single sign-on (SSO) client — screenshot 15 Set up a single sign-on (SSO) client — screenshot 16 Set up a single sign-on (SSO) client — screenshot 17 Set up a single sign-on (SSO) client — screenshot 18

Enabling SSO using Onelogin

Enabling SSO using Onelogin Enabling SSO using Onelogin Enabling SSO using Onelogin Enabling SSO using Onelogin Enabling SSO using Onelogin Set up a single sign-on (SSO) client — screenshot 24 Set up a single sign-on (SSO) client — screenshot 25 Set up a single sign-on (SSO) client — screenshot 26

Enabling SSO using Xecurify

Enabling SSO using Xecurify Enabling SSO using Xecurify Enabling SSO using Xecurify Enabling SSO using Xecurify Enabling SSO using Xecurify Set up a single sign-on (SSO) client — screenshot 32 Set up a single sign-on (SSO) client — screenshot 33 Set up a single sign-on (SSO) client — screenshot 34