About SAML Single Sign-On (SSO)
Edited

Single sign-on (SSO) helps organisations manage users, allowing them to authenticate and log in to various applications with just one set of credentials. It allows team admins to manage users in a single location at your Identity Provider (IdP).

When a team's domain is configured, it will enforce that all accounts with the domain only log in via that SAML SSO connection. For example, if @omnicorp.com has been configured for SAML SSO via Okta, then all users with the @omnicorp.com email address can only log in via SAML SSO via Okta.


Supported Identity Providers

Mobbin partners with WorkOS for SAML SSO integration. Here are the list of IdPs supported:

  1. Okta

  2. Auth0 SAML

  3. Azure AD

  4. Google SAML

  5. CyberArk SAML

  6. Duo SAML

  7. Generic SAML

  8. JumpCloud SAML

  9. Microsoft AD FS

  10. OneLogin

  11. OpenID Connect

  12. PingFederate

  13. PingOne

  14. Salesforce

  15. VMware Workspace One

If you do not see your IdP here, please contact us.


Setting up SAML SSO

The process for configuring SAML SSO depends on your IdP. Therefore, you must already have a service with an IdP of your choice at the time of configuration.

Here are the steps to configure SAML SSO:

  1. Log in to your Mobbin account.

  2. Navigate to the top-right corner of the page and click on your avatar.

  3. From the menu, select Membership.

  4. Look for your team and click on SAML. 

  5. This will bring you to WorkOS. Select the IdP of your choice, and follow the instructions to configure SSO.