or Submit a support ticket
Skip to content
  • There are no suggestions because the search field is empty.

Configuring Single Sign-on (SSO) in Gridly

Table of contents:


 

Before adding your SSO metadata (sign-in URL) via Security in Company Settings, you need to first retrieve it from your SSO identity provider, following one of the following articles:

What is SSO?

Single Sign-on (SSO) allows Gridly users to log in to Gridly via an identity provider (IDP) of their choice. This allows admin users to better manage team access and keeps information secure.

SSO settings

Only Owner or custom company Roles that have the same rights as Owners can access Security options. Learn more in this article: Permission overview.

  1. On the Dashboard page, click mceclip0.png and select Company Settings.
  2. Select Security from the side panel.
  3. Click Enable in the Setting Single Sign-on (SSO) section.
  4. You’ll find the Add Assertion Consumer Service (ACS) URL and Service Provider metadata URL. Copy these links and paste them to the SAML Settings in your Identity Provider application. 
  5. Enter the IdP metadata URL that is retrieved from your SSO identity provider (following these articles if you are using Okta orMicrosoft Entra ID). 
  6. Click Save

Open_Security.gif

Requiring SSO for all users

You can also enforce SAML SSO for your organization. When you enforce SAML SSO, all members of the organization must authenticate through your IdP to access the organization's resources. 

  1. Open SAML Settings
  2. Click the toggle in Require single sign-on (SSO).
  3. Input the email domains that are required to authenticate via your SAML server in the textbox and press Enter .
  4. Exclude users from single sign-on (SSO) requirement: select members from your company that should be excluded in the SSO login and enabled login by email and password.Enable_require_single_sign_on.gif
  5. Click Save to finish setting SSO in Gridly.