Configure SSO
This guide walks you through setting up SAML Single Sign-On for your Slim.io organization.
Time required: 10–15 minutes
Prerequisites:
- Admin access to the Slim.io Customer Dashboard
- Admin access to your identity provider (Entra ID, Okta, or Google Workspace)
Step 1: Open Identity Settings
- Navigate to Settings > Identity in the Customer Dashboard.
- Click Add Connection.
- Select your identity provider from the list.
Slim.io displays its SP metadata that you will need for the IdP configuration:
- Entity ID:
https://slim.io/saml/metadata - ACS URL:
https://slim.io/saml/acs
Step 2: Configure Your Identity Provider
For Entra ID (Azure AD)
- In Azure Portal, go to Enterprise Applications > New Application.
- Select Create your own application (Non-gallery).
- Go to Single sign-on > SAML.
- Set Identifier:
https://slim.io/saml/metadata. - Set Reply URL:
https://slim.io/saml/acs. - Under Attributes & Claims, verify
emailmaps touser.mail. - Download the Certificate (Base64) and copy the Login URL.
For Okta
- In Okta Admin Console, go to Applications > Create App Integration > SAML 2.0.
- Set SSO URL:
https://slim.io/saml/acs. - Set Audience URI:
https://slim.io/saml/metadata. - Set Name ID format:
EmailAddress. - Add attribute:
email=user.email. - Copy the Identity Provider Metadata URL.
For Google Workspace
- In Google Admin Console, go to Apps > Web and mobile apps > Add SAML app.
- Set ACS URL:
https://slim.io/saml/acs. - Set Entity ID:
https://slim.io/saml/metadata. - Set Name ID format:
EMAIL. - Download the IdP metadata XML.
Step 3: Enter IdP Details in Slim.io
Back in the Slim.io Identity settings:
- Paste the IdP SSO URL (Login URL).
- Paste the IdP Entity ID.
- Upload or paste the IdP Certificate (PEM or Base64 format).
- Alternatively, paste the Metadata URL and Slim.io will extract the values automatically.
Step 4: Test the Connection
- Click Test Connection.
- A new window opens with the IdP login page.
- Sign in with your IdP credentials.
- On success, you are redirected back to Slim.io with a confirmation message.
If the test fails, check: (1) the ACS URL matches exactly, (2) the certificate is valid and not expired, (3) the user’s email exists in the IdP.
Step 5: Activate SSO
- After a successful test, click Activate.
- Choose whether to enforce SSO (disable email/password login) or offer it as an option.
- If enforcing, confirm that at least one admin retains recovery access.
Step 6: Verify User Access
- Have a team member sign out and sign back in.
- They should be redirected to the IdP login page.
- After IdP authentication, they land in the Slim.io dashboard.
- New users (JIT provisioning) appear with the Viewer role in the Default workspace.
Post-Setup
- Assign roles: Promote JIT-provisioned users from Viewer to Editor or Admin as needed
- Configure group mapping: Map IdP groups to Slim.io roles under Settings > Identity > Role Mapping
- Monitor: Check the audit log for SSO login events under Settings > Audit Log
Next Steps
- Workspaces & RBAC — Organize users into workspaces with appropriate roles
- Security overview — Review the full security architecture
Last updated on