Configuring Single Sign-on (SSO) in Gridly
Table of contents:
Before adding your SSO metadata (sign-in URL) via Security in Company Settings, you need to first retrieve it from your SSO identity provider, following one of the following articles:
What is SSO?
Single Sign-on (SSO) allows Gridly users to log in to Gridly via an identity provider (IDP) of their choice. This allows admin users to better manage team access and keeps information secure.
SSO settings
Only Owner or custom company Roles that have the same rights as Owners can access Security options. Learn more in this article: Permission overview.
- On the Dashboard page, click
and select Company Settings.
- Select Security from the side panel.
- Click Enable in the Setting Single Sign-on (SSO) section.
- You’ll find the Add Assertion Consumer Service (ACS) URL and Service Provider metadata URL. Copy these links and paste them to the SAML Settings in your Identity Provider application.
- Enter the IdP metadata URL that is retrieved from your SSO identity provider (following these articles if you are using Okta orMicrosoft Entra ID).
- Click Save
Requiring SSO for all users
You can also enforce SAML SSO for your organization. When you enforce SAML SSO, all members of the organization must authenticate through your IdP to access the organization's resources.
- Open SAML Settings
- Click the toggle in Require single sign-on (SSO).
- Input the email domains that are required to authenticate via your SAML server in the textbox and press Enter .
- Exclude users from single sign-on (SSO) requirement: select members from your company that should be excluded in the SSO login and enabled login by email and password.
- Click Save to finish setting SSO in Gridly.