Follow the steps below to set up SSO for your organization. For guidance and next steps, please reach out to your Customer Success Manager or to our Support team at Support@midaxo.com.
- Provide the SSO documentation found here to your IT team that will be assisting with configuration.
- Share the requested sign-in URL and metadata, OR the Issuer URL and Client ID (depending on if you're using SAML or OISC) information listed below. Midaxo can only establish the connection after you've shared this information.
- If using SAML 2.0, please provide the:
- Sign-in URL
- X509 Signing certificate/ metadata
- If using OIDC, please provide the:
- Issuer URL
- Client ID
- If using SAML 2.0, please provide the:
- Midaxo supports SAML 2.0 and OpenID (OIDC). Currently, it is not possible to manage permissions through SAML/ OIDC groups.
- After sharing the above information with your Customer Success Manager, you will receive the return URL and any other requirements to finalize the configuration on your end.
Next, you will need activate SSO in Midaxo for the User's who need it. To activate SSO, please see the article here.
Once you have configured the required settings on your end, we can test to ensure that SSO is working. We recommend scheduling a call with Midaxo and a member of your IT team to test the SSO login and troubleshoot any configuration issues.
- Please Note: SSO can be tested with any active User in Midaxo, they do not need to be an Administrator. The User's login email should match the email they have in your organization's SSO configuration.
OKTA
If your organization uses OKTA and you have an OKTA Dashboard, you likely have a Midaxo Cloud tile within your dashboard. If not, your IT team can set this up. With an OKTA tile, you can login from your
OKTA dashboard by clicking on the Midaxo Cloud tile.
- Please Note: This action can only be taken on the customer side. Midaxo does not have access to your OKTA.
Multi-Factor Authentication
- Midaxo Cloud supports both Single Sign-On and Multi-factor Authentication, however, both cannot be active at the same time. Read more about Multi-Factor Authentication here.