Single Sign-On
This feature is available in our paid editions. Contact us here, and we'll be delighted to assist you!
Enforcing SSO
You can enforce SSO by specifying the domain. As part of the SSO configuration, you have the option to disable email and user login. This ensures that all authentication is routed through the designated SSO provider.
Supported SSO Providers
You can enable various SSO providers, including Google and GitHub, to integrate with your system by configuring SSO.
Google:
Go to the Developer Console
Create an OAuth2 App
Copy the Redirect URL from the Configure Screen into the Google App
Fill in the Client ID & Client Secret in Activepieces
Click Finish
GitHub:
Go to the GitHub Developer Settings
Create a new OAuth App
Fill in the App details and click Register a new application
Use the following Redirect URL from the Configure Screen
Fill in the Homepage URL with the URL of your application
Click Register application
Copy the Client ID and Client Secret and fill them in Activepieces
Click Finish
SAML with OKTA:
Go to the Okta Admin Portal and create a new app
Select SAML 2.0 as the Sign-on method
Fill in the App details and click Next
Use the following Single Sign-On URL from the Configure Screen
Fill in Audience URI (SP Entity ID) with 'Activepieces'
Add the following attributes (firstName, lastName, email)
Click Next and Finish
Go to the Sign On tab and click on View Setup Instructions
Copy the Identity Provider metadata and paste it in the Idp Metadata field
Copy the Signing Certificate and paste it in the Signing Key field
Click Save