Supported protocols
Profile supports two industry-standard SSO protocols:| Protocol | Best for |
|---|---|
| SAML 2.0 | Most enterprise IdPs (Okta, Azure AD/Entra, Google Workspace, OneLogin) |
| OIDC | Modern IdPs with OpenID Connect support |
Setting up SSO
Prerequisites
Before configuring SSO, ensure you have:- Owner or Admin role in your Profile organization
- Administrator access to your identity provider
- Your organization’s email domain (e.g.,
yourcompany.com)
Step 1: Create an SSO connection
- Navigate to Account from the left navigation
- Scroll to the Single Sign-On (SSO) section
- Click Add SSO connection
- Choose your connection type (SAML or OIDC)
- Enter a display name (e.g., “Okta SSO” or “Company Azure AD”)
- Select your identity provider from the dropdown if available
Step 2: Configure your identity provider
- SAML
- OIDC
In your identity provider, create a new SAML application and configure:Service Provider (SP) Details — provided by Profile:
- ACS URL (Assertion Consumer Service)
- Entity ID (SP Entity ID)
| Profile Attribute | Common IdP Names |
|---|---|
email | email, emailAddress, http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress |
full_name | name, displayName, http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Attribute names vary by IdP. Check your provider’s documentation for exact field names.
Step 3: Complete the connection
Return to Profile and enter the configuration from your IdP:- SAML — Metadata URL
- SAML — Manual Configuration
- OIDC
If your IdP provides a metadata URL:
- Enter your Email Domain (e.g.,
yourcompany.com) - Enter the Metadata URL
- Click Save
Enforcing SSO
After SSO is configured and working, you can require all users to authenticate via SSO: Enable Require SSO for all usersHow users log in with SSO
Once SSO is configured, users can authenticate in two ways:Email-based discovery
- User enters their email address on the login page
- Profile detects their domain has SSO configured
- User is redirected to your IdP to authenticate
- After successful IdP authentication, user is logged into Profile
Managing SSO connections
Viewing connections
Navigate to Account > Single Sign-On (SSO) to see all configured connections, including:- Connection name and type (SAML/OIDC)
- Status (Active, Pending, or Inactive)
- Identity provider
Updating a connection
Click on an existing connection to update its configuration. This is useful when:- Your IdP certificate is rotating
- You need to update attribute mappings
- Connection details have changed
Deleting a connection
To delete a connection:- Click the connection you want to remove
- Click Delete Connection
- Confirm the deletion
Troubleshooting
Connection shows as Pending or Inactive
Connection shows as Pending or Inactive
Ensure all required fields are configured:
- For SAML: IdP Entity ID, SSO URL, X.509 Certificate, and Attribute Mapping
- For OIDC: Client ID, Client Secret, and Issuer URL
'Unable to find valid email' error
'Unable to find valid email' error
Your IdP’s attribute mapping doesn’t match what Profile expects. Check that:
- The email attribute is being sent in the SAML response
- The attribute name in your IdP matches your Profile configuration
email, emailAddress, or the full SAML claim URI.Users redirected to wrong environment
Users redirected to wrong environment
Ensure the Redirect URL or ACS URL configured in your IdP points to the correct Profile environment (production vs staging).
SSO works but users can't access their account
SSO works but users can't access their account
The user’s email domain must match the configured SSO domain. Users with emails from other domains will need to use standard authentication methods.
IdP-specific guides
Okta
Create a SAML 2.0 application in Okta. Use the metadata URL for easy configuration.
Azure AD / Entra
Create an Enterprise Application with SAML SSO. Download the Federation Metadata XML URL.
Google Workspace
Configure a custom SAML app in Google Admin Console.
OneLogin
Add a SAML 2.0 connector in OneLogin’s application catalog.
Security considerations
- SSO credentials are never stored by Profile — authentication is handled entirely by your IdP
- Session duration follows your IdP’s configuration when SSO is used
- Enabling “Require SSO” ensures all authentication flows through your IdP’s security policies
- Users are automatically provisioned on first SSO login if they don’t already exist