Single Sign-On (SSO) lets your company members securely access the Intigriti platform using your Identity Provider (IdP). This simplifies login and improves security by eliminating separate Intigriti passwords and enables centralized authentication. Intigriti supports SSO through the OpenID Connect (OIDC) protocol.
Configure SSO
⚙️Roles: Company Admin
Select your Identity Provider below. Each section provides guidance on how to configure Single Sign-On for that provider.
Azure
Azure
Below you will find the steps to setup SSO for the Intigriti platform using Azure. A video showcasing the process can be found below.
Below you can find the permissions Intigriti will require for each IdP to successfully setup SSO:
For Azure: Microsoft Graph API – User.read (https://learn.microsoft.com/en-us/graph/permissions-reference#userread)
These permissions should be delegated automatically when following the setup instructions.
Sign in to Azure
Navigate to “Entra ID”
Navigate to “App registrations”
Click “New registration”
Register an application
Name “Intigriti SSO”
Select “Supported account types” relevant to your company
Redirect URL
Select “Web” from dropdown
Copy and paste “Redirect URL” from Intigriti platform SSO page
Click “Register”
Navigate to “Certificates & secrets”
Add “New client secret”
Give it a description/name and set the expiry time
Copy “Value”
Paste into “Client secret (optional)” in Intigriti platform
Navigate back to “Overview”
Copy “Application (client) ID” value in Azure
Paste into “Client ID” in Intigriti platform
Click on “Endpoints” in Azure App registration overview page
Copy “OpenID Connect metadata document”
Paste into “Identity provider URL” in Intigriti platform
In Intigriti platform, enter an “Identity provider name” e.g. “Azure”.
Click “Save”
Click “Activate”
Navigate to “Company Members”
Click the three dots next to company member
Enable SSO
User will then receive an email with a button to sign in via SSO.
This email only needs to be interacted with once, after that they can just log into the Intigriti platform and be redirected to sign in via SSO.
Azure Troubleshooting
Azure Troubleshooting
Expired Client Secret
Expired Client Secret
If you face the error message "Message contains error: 'invalid_client', error_description: 'AADSTS7000222: The provided client secret keys for app '397be451-3881-404f-8831-725d743beacb' are expired." Follow the below steps to create a new client secret in Azure:
Log in to Azure
Entra ID
App Registrations
All Applications
Intigriti SSO app (The app created previously for SSO with Intigriti)
Certificates and Secrets (left hand menu)
"New client secret"
Provide description and expiry time
Paste newly created client secret into "client secret" field in Intigriti SSO configuration page.
💡 Should you need to update the client secret but you cannot access the platform because of it, contact your CSM.
Someone from Intigriti will disable the SSO on the responsible user account so they can access the platform via a local account* and update the client secret. SSO can then be re-enabled on their account.
*When SSO is disabled on an account, the user will receive an email to set up the password for their local account.
Error containing “invalid_request” or “invalid_client” and containing error code “AADSTS7000218” or “AADSTS50146”
Error containing “invalid_request” or “invalid_client” and containing error code “AADSTS7000218” or “AADSTS50146”
This is potentially due to a custom claim interfering with the SSO process. To check, navigate to:
Azure
Entra ID
Enterprise Applications
Intigriti SSO
Single Sign-on
Attributes & Claims
Remove any claims
Approval required when signing in via SSO
Approval required when signing in via SSO
Should you run into the issue where you are required to “Request Approval” from an administrator, check the following:
Azure
EntraID
App Registrations
Intigriti SSO
API Permissions
Add a permission
Microsoft Graph
Delegated permissions
User.read
Important: Make sure that “Intigriti SSO” is a separate enterprise application. If it isn’t, follow the setup steps. Following the setup steps, after creating an app registration for “Intigriti SSO”, it will create an “Intigriti SSO” enterprise app.
Okta
Okta
Below you will find the steps to setup SSO for the Intigriti platform using Okta. A video showcasing the process can be found below.
Below you can find the permissions Intigriti will require for each IdP to successfully setup SSO:
For Okta: API Access Management: https://developer.okta.com/docs/concepts/api-access-management/
Important to note that Okta API Access Management is a paid-for feature of Okta – please check if your plan includes this prior to set up.
Login to Okta management UI
Navigate to Applications -> Applications
Click “Create App Integration”
Sign-in method: OIDC
Application type: Web Application
Name
Grant type
Client acting on behalf of itself: Client Credentials
Client acting on behalf of user: Authorization Code
Sign-in redirect URIs
Remove placeholder URI
Copy Redirect URL from Intigriti platform SSO page
Add URI -> Paste
Sign-out redirect URIs
Remove placeholder URI
Assignments
Controlled access: Allow everyone in your organization to access
Or limit to specific users
Enable immediate access: Untick “Enable immediate access with Federation Broker Mode”
Save
Navigate to “Sign on”
OpenID Connect ID Token
Edit
Issuer: Okta URL
Save
Copy “Okta URL”
Paste Okta URL into “Identity provider URL” in Intigriti platform
Navigate to “General”
Copy “Client ID”
Paste into “Client ID” in Intigiriti platform
Copy “Client Secret”
If no client secret, generate new secret
Paste into “Client secret (optional)” in Intigriti platform
Provide an “Identity provider name”
Click “Save”
Click “Activate”
Navigate to “Company Members”
Click the three dots at the end of a member
Enable SSO
User will then receive an email with a button to sign in via SSO.
This email only needs to be interacted with once, after that they can just log into the Intigriti platform and be redirected to sign in via SSO.
Auth0
Auth0
Below you will find the steps to set up SSO for the Intigriti platform using Auth0
Create an application using the Auth0 guide.
Application name: 'Intigriti'
Application type: ✅ 'Regular Web Applications'
Open the newly created application.
Go to Settings.
Retrieve the following information from the Basic information section:
Identity provider URL = Domain
Client ID
Client Secret
Add the Redirect URL provided on the Intigriti SSO Settings page to the Allowed Callback URLs in the Application URIs section:
If your Identity Provider is not listed, refer to your provider’s documentation for guidance on configuring OpenID Connect.
💡Note: If you would like tailored instructions for a specific Identity Provider, please reach out to your Customer Success Manager.
Activate SSO
Once the Single Sign-On configuration page is completed with the values from your chosen Identity Provider, you can activate SSO and enable it for your users.
Navigate to Intigriti > Admin > More > Single Sign-On.
Provide the following information:
Client Secret
Client ID
Redirect URL
Identity Provider URL
Click Activate.
After successfully, activating your SSO integration:
Navigate to Company Members.
Click the three dots at the end of a member.
Enable SSO.
Repeat this step for each user you want to enable SSO for.
💡Note: When Single Sign-On is enabled for a user, an email is sent requesting them to reauthenticate via SSO. This step is required only once.
Edit SSO settings
You can edit the Single Sign-On configuration without deactivating SSO. This is especially useful when updating an expired client secret.
Go to Intigriti > Admin > More > Single Sign-On.
Click Edit.
Update the desired fields.
Click Save.
⚠️Beware: Make sure all changes in the Identity Provider are saved before editing the configuration in Intigriti.
If SSO stops working after editing, verify that the values from your Identity Provider are correct in the Intigriti platform. You can follow the setup steps for your Identity Provider again to confirm the configuration.
Deactive SSO
Single Sign-On can be disabled for individual users from the Company Members page or for the entire organisation by deactivating the SSO integration.
When Single Sign-On is deactivated:
The authentication method for all your company members is reverted to password authentication.
All active converted company members receive an email requesting them to set up a new password, which they must use to sign in going forward.
Company members are no longer redirected to the Identity Provider and can only access the Intigriti platform using local account credentials.
The existing Single Sign-On configuration remains available, allowing you to easily enable it again in the future if needed.
Best practices
Test the Single Sign-On integration with a company member or another company admin before enabling it for all users. This helps prevent accidental lockouts and ensures a smooth transition.
If a lockout does occur during the transition, contact your Customer Success Manager for assistance.
Monitor Identity Provider credentials and update them before they expire to ensure uninterrupted access to the platform.


