To enhance security and streamline user login, ActionAtlas supports SSO integration with Microsoft, Google, Okta, and custom SAML-based identity providers. Single Sign-On allows users to access multiple applications with one set of login credentials, improving both security and user experience.
In This Article:
Prerequisites
Before setting up Single Sign-On for your ActionAtlas environment, ensure you meet the following requirements:
Before You Begin:
- Administrative Access: You must have Admin privileges in your ActionAtlas account
- Identity Provider Access: Ensure you have administrator access to your identity provider (Microsoft, Google, Okta, or your custom SAML IdP)
- Plan Compatibility: SSO is available on Business and Enterprise plans
Note: We recommend performing SSO setup during a maintenance window or off-peak hours to minimize disruption to users.
Accessing SSO Settings
To configure Single Sign-On settings for your ActionAtlas tenant:
- Log in to your ActionAtlas account with administrator privileges
- Navigate to Administration from the main navigation menu
- Select Security from the left sidebar
- Click on the SSO tab
From this page, you can view your current SSO status and choose from supported identity providers to set up integration.
1️⃣ Microsoft SSO Setup
Connect your Microsoft Azure Active Directory to enable seamless single sign-on with your Microsoft credentials:
Setup Steps:
- Click Connect Microsoft SSO
- You'll be redirected to our setup flow via Auth0
- Follow the prompt to sign in with your Microsoft account that manages your organization's Azure AD
- Grant permission to allow ActionAtlas to integrate with Azure Active Directory
- Confirm and complete the setup
- After completion, you'll be redirected back to ActionAtlas with Microsoft SSO enabled
Note: You'll need Global Admin or Application Administrator rights in your Azure AD tenant to grant the necessary permissions.
2️⃣ Google Workspace SSO Setup
Integrate with Google Workspace to allow users to sign in using their Google accounts:
Setup Steps:
- Click Connect Google SSO
- You'll be redirected to the Auth0 setup flow
- Sign in using your Google Workspace admin account
- Grant permission for ActionAtlas to access your directory
- Confirm the setup to finalize integration
- You'll be redirected back to ActionAtlas with Google SSO enabled
Note: Ensure your Google Workspace admin account has the necessary permissions to create OAuth application connections.
3️⃣ Okta SSO Setup
Integrate with Okta Identity Cloud to leverage your existing Okta user directory for ActionAtlas authentication:
Setup Steps:
- Click Connect Okta SSO
- You'll be redirected to the Auth0 configuration flow
- Provide the following from your Okta Admin Console:
- Okta Domain (e.g., yourcompany.okta.com)
- Client ID and Client Secret from the created app integration
- Paste these values into the corresponding fields in ActionAtlas's setup page
- Click Save and complete the handshake
- Your Okta integration will now be live
Note: You'll first need to create an OIDC application integration in your Okta Admin Console and configure it for ActionAtlas. Detailed instructions are available in your Okta documentation.
4️⃣ Custom SAML SSO Setup
Configure a custom SAML integration with any identity provider that supports the SAML 2.0 protocol:
Setup Steps:
- Click Set Up Custom SAML
- You'll be directed to the SAML configuration flow
- Provide the following information:
- Identity Provider Issuer (Entity ID)
- SSO URL (Login URL)
- X.509 Certificate
- Optionally, configure:
- Logout URL
- Attribute mappings (e.g., name, email, groups)
- Click Save to complete your custom SAML setup
Note: Custom SAML setup requires technical knowledge of SAML protocols. You may need to coordinate with your IT team for proper configuration. ActionAtlas provides the Service Provider (SP) metadata that you'll need to configure in your Identity Provider.
🔁 Testing and Rollout
After setting up your SSO integration, follow these steps to test and deploy it to your users:
Testing Your SSO Configuration:
- After setup, locate the "Test Connection" button in your SSO configuration screen
- Click on it to initiate a test authentication flow
- You'll be redirected to your identity provider's login page
- Complete the authentication process
- Upon successful authentication, you'll be returned to ActionAtlas
- A success message will confirm that your SSO connection is working properly
Rollout to Users:
- Once testing is successful, you can enable SSO as the default login method
- Toggle the "Enable SSO as Default Login" option to "On"
- Choose your rollout approach:
- Immediate: All users will be required to use SSO immediately
- Gradual: Set a date when SSO becomes mandatory
- Users will be redirected to your identity provider during login
- Consider sending an announcement to users about the new login process
Important: Before enabling SSO as the default login method for all users, thoroughly test the configuration and ensure your users are properly synced between ActionAtlas and your identity provider to prevent access issues.
🔄 Managing Your SSO Connection
After setting up SSO, you can manage your configuration or make changes as needed:
Managing Your SSO Connection:
You can return to Administration > Security > SSO at any time to:
- View your active configuration
- Disable SSO temporarily or permanently
- Initiate a new setup flow if needed
Need to Change Your SSO Connection?
If you need to change or update your SSO configuration after setup, please submit a support ticket through the ActionAtlas Help Center. Our team will assist you with making changes safely and securely.
Pro Tip: When making significant changes to your SSO configuration, we recommend scheduling these changes during off-hours and having a backup administrator account with direct login capabilities in case of configuration issues.
Need Help?
Our security specialists are available to assist with questions about configuring Single Sign-On for your organization.
Contact Support