Skip to main content

SSO & SCIM

Enterprise Single Sign-On (SSO) and automated user provisioning (SCIM) for centralized identity management.

SSO Overview

Connect MeetLoyd to your identity provider so users authenticate through your existing corporate directory.

User → Identity Provider → SAML/OIDC → MeetLoyd

Supported Providers

ProviderSAMLOIDC
Google WorkspaceYesYes
OktaYesYes
Azure AD (Entra ID)YesYes
OneLoginYesYes
Ping IdentityYesYes
Auth0YesYes
JumpCloudYesYes
Custom SAML IdPYes--
Custom OIDC IdP--Yes

Service Provider Details

When configuring your Identity Provider, use these MeetLoyd endpoints:

SettingValue
SP Entity IDhttps://app.meetloyd.com/api/sso
ACS URL (SAML)https://app.meetloyd.com/api/sso/saml
OIDC Redirect URIhttps://app.meetloyd.com/api/sso/callback/{connectionId}
info

For OIDC, the redirect URI includes your connection ID. You can find this ID in the SSO settings after creating your connection.

Domain Verification

Verify domain ownership for SSO:

  1. Go to Settings > SSO > Domains
  2. Click Add Domain
  3. Add the DNS TXT record shown
  4. Click Verify

SSO Enforcement

Require SSO for specific domains:

  1. Enable SSO connection
  2. Add domains to Allowed Domains
  3. Enable Enforce for Domains

Users with these email domains must use SSO -- password login will be disabled for them.

SCIM Overview

System for Cross-domain Identity Management (SCIM) enables automatic user provisioning.

Identity Provider → SCIM API → MeetLoyd

Benefits

  • Automated provisioning: Users created when added in IdP
  • Automated deprovisioning: Users removed when deleted in IdP
  • Sync groups: Team membership from IdP groups
  • Real-time updates: Changes sync immediately

Troubleshooting

IssueResolution
"SAML Response Invalid"Check IdP certificate is correctly pasted (include BEGIN/END lines). Verify ACS URL matches exactly. Check system clocks are in sync (SAML has a 5-minute time window). Ensure Name ID format matches (EMAIL recommended).
"User Not Provisioned"Check JIT provisioning is enabled. Verify email domain is in allowed list. Check attribute mapping for email claim.
"Group Sync Not Working"Verify groups claim is in SAML response. Check role mapping configuration. Ensure IdP sends group memberships in assertion.
SCIM ErrorsCheck the Activity Log in Settings > SCIM. Common issues: 401 (token expired), 400 (missing required fields), 409 (user already exists).
Best Practices
  1. Test before enforcement -- Start with SSO optional, test with pilot users, then enable enforcement
  2. Keep a backup admin -- Always have at least one admin who can login without SSO for emergencies
  3. Map roles carefully -- Use a safe default role (viewer) for unmapped users
  4. Monitor SCIM sync -- Review the SCIM Activity Log regularly to catch sync issues early

Next: Learn about Approvals for human oversight of sensitive operations.