Overview
Single Sign-On (SSO) allows your team to access Wolfia using your organization’s identity provider (IdP) like Okta, Azure AD, OneLogin, or Google Workspace. This provides:- Centralized access control: Manage user access from your IdP
- Enhanced security: Enforce your organization’s authentication policies
- Simplified user experience: One login for all applications
- Automatic user provisioning: Users can self-service access through your IdP
Supported identity providers
Wolfia supports SSO with all major identity providers:- Okta
- Azure Active Directory (Microsoft Entra ID)
- Google Workspace
- OneLogin
- Auth0
- PingIdentity
- JumpCloud
- Authentik
- Any SAML 2.0 compatible provider
Prerequisites
Before setting up SSO, ensure you have:- Admin access to your identity provider
- Admin access to Wolfia (must be an Administrator)
- Your organization’s domain verified in Wolfia
Contact your Wolfia account representative to receive your unique SSO setup link and ensure your organization is configured for SSO.
Setup process
1
Request SSO setup
Contact your Wolfia account representative or email support@wolfia.com to:
- Enable SSO for your organization
- Receive your unique SSO configuration portal link
- Verify your domain configuration
2
Access the SSO configuration portal
Click the SSO setup link provided by Wolfia. You’ll be directed to a guided configuration portal where you can connect your identity provider.The portal provides a step-by-step process tailored to your chosen IdP.
3
Select your identity provider
In the configuration portal:
- Choose your identity provider from the list
- Follow the provider-specific configuration steps
- The portal provides detailed instructions tailored to your IdP
- For Okta, Azure AD, or OneLogin: Follow SAML configuration steps
- For Google Workspace: Use OAuth-based setup
- For Authentik: Use SAML or OAuth configuration
4
Configure your identity provider
The configuration portal will provide you with details to enter in your IdP:For SAML providers (Okta, Azure AD, OneLogin, Authentik):
- Single Sign-On URL (ACS URL): Copy from configuration portal
- Entity ID (Audience URI): Copy from configuration portal
- Name ID format: Email Address
- Attribute statements: Email, First Name, Last Name
- Create a new SAML application for Wolfia
- Enter the configuration details provided by the portal
- Assign users or groups who should have access to Wolfia
- Note the IdP metadata URL or download the XML certificate
5
Complete the connection
Return to the Wolfia configuration portal and:
- Enter your IdP metadata URL or upload the XML certificate
- Review the connection details
- Click “Finish Setup”
6
Test SSO login
Before rolling out to your team:
- Open a private/incognito browser window
- Go to wolfia.com/auth/login
- Enter your work email address
- You should be redirected to your identity provider for authentication
- After successful authentication, you’ll be logged into Wolfia
Test with your own account first before communicating changes to your team. Ensure you can successfully log in via SSO before disabling other authentication methods.
7
Configure default authentication (Optional)
After verifying SSO works:
- Contact Wolfia support to set SSO as the default authentication method
- This ensures all users with your domain automatically use SSO
- Legacy password authentication can be disabled for enhanced security
User experience after SSO is enabled
Once SSO is configured:-
New users:
- Visit wolfia.com/auth/login
- Enter their work email address
- Automatically redirected to your company’s login page
- After authentication, gain immediate access to Wolfia
-
Existing users:
- Next login will automatically use SSO
- No password changes or setup required
- Existing sessions remain active until logout
-
Access control:
- Users must be assigned to the Wolfia application in your IdP
- Removing a user from your IdP removes their Wolfia access
- Your IdP’s authentication policies apply (MFA, IP restrictions, etc.)
Attribute mapping
Wolfia automatically syncs the following attributes from your IdP:| Attribute | SAML Claim | Usage |
|---|---|---|
email or emailAddress | User identifier and login | |
| First Name | firstName or givenName | User profile display |
| Last Name | lastName or surname | User profile display |
| Groups (optional) | groups | For role assignment with SCIM |
For advanced attribute mapping or custom claims, contact Wolfia support. We can configure additional attributes as needed.
Troubleshooting
User can’t log in via SSO
Common causes:- User not assigned to Wolfia application in your IdP
- Email address doesn’t match between IdP and Wolfia
- SSO configuration incomplete or incorrect
- Verify user is assigned to Wolfia in your IdP
- Check that email addresses match exactly
- Review SSO configuration in the setup portal
- Test with a different user to isolate the issue
Redirect loop or error page
Common causes:- Incorrect ACS URL or Entity ID
- Name ID format mismatch
- IdP metadata outdated
- Verify ACS URL and Entity ID in your IdP match the configuration portal
- Ensure Name ID format is set to “Email Address”
- Re-upload IdP metadata or update metadata URL
- Clear browser cache and cookies, then test again
”Invalid SAML response” error
Common causes:- Certificate expired or invalid
- Clock skew between IdP and service provider
- Assertion not signed
- Verify IdP certificate is valid and not expired
- Check time sync on IdP server
- Ensure SAML assertions are signed in your IdP
- Contact Wolfia support with error details
Provider-specific guides
Okta configuration
- In Okta Admin Console, create a new SAML 2.0 application
- Use the ACS URL and Entity ID from Wolfia’s configuration portal
- Map attributes: email, firstName, lastName
- Assign users or groups to the application
- Copy the IdP metadata URL back to Wolfia
Azure AD (Entra ID) configuration
- In Azure Portal, create a new Enterprise Application
- Choose “SAML” as the single sign-on method
- Enter the Entity ID and Reply URL from Wolfia
- Configure user attributes and claims
- Download the Federation Metadata XML
- Upload to Wolfia’s configuration portal
Google Workspace configuration
- In Google Admin Console, go to Apps → Web and mobile apps
- Add a custom SAML app for Wolfia
- Download IdP metadata from Google
- Enter ACS URL and Entity ID from Wolfia
- Map attributes: Primary email, First name, Last name
- Upload Google’s metadata to Wolfia
Authentik configuration
- In Authentik Admin Interface, create a new Provider
- Choose “SAML Provider” as the type
- Enter the ACS URL and Issuer from Wolfia
- Configure property mappings for email, name
- Create an Application and bind the provider
- Export metadata and upload to Wolfia
Need help?
If you encounter any issues during SSO setup:- Email: support@wolfia.com
- Include: Organization name, identity provider type, and any error messages
- Response time: We typically respond within 1 business day
Related guides
- SCIM User Provisioning Setup - Automate user and group synchronization
- Setting up Wolfia - General admin setup guide
- API Overview - Programmatic access with SSO

