Configure SSO in the Staffbase Studio

Learn how to configure SSO for the Staffbase platform.

Staffbase Email
beta

In this article, you will learn how to set up using the or protocol in the Staffbase Platform.

You can set up the configuration in three steps:

  1. Prepare for integration in your IdP
  2. Add SSO configuration in Staffbase Studio
  3. Test the configuration

Before configuring SSO in Staffbase, complete the setup in your IdP.

Prerequisite:

Staffbase provides documentation for the following commonly used IdPs:

Refer to the relevant guide for your IdP and follow its documentation to complete these steps in your IdP:

  1. Create a new application or integration for Staffbase.
  2. Select SAML or OIDC as the SSO method.
  3. Configure the SSO settings according to the selected protocol.
  4. Collect the configuration details required to complete the setup in Staffbase Studio.

After preparing your IdP for integration, you can now add a new SSO configuration in Staffbase Studio.

  • You have the role of an administrator in the Staffbase Studio.
  • The SSO self-service feature is activated in your Staffbase platform. If not, contact Staffbase Support or your Customer Success Manager.
  • You have all the information required to add the configuration.
  1. In the Studio, navigate to Settings > SSO Configuration.
  2. Click Add SSO Configuration.
  1. In the Configuration Identifier field, provide a name to identify the configuration.

    The Configuration Identifier is used for internal reference only and is not displayed to users.

  2. In the Sign-In Label field, provide the text for the sign-in button.

  3. Under Select SSO method, select one of the following SSO protocols:

  • SAML
  • OIDC

=======

Once you have entered the configuration identifier, you can retrieve the Service Provider (SP) data required for your IdP configuration.

You need to get the data from your IdP.

If your IdP requires importing Staffbase metadata first, you can access the SP Metadata URL after saving the configuration. Since the configuration requires both an Endpoint URL and a Metadata URL, you may initially enter placeholder values (e.g., https://to.be.replaced) to save the configuration. Once you have the correct values, replace the placeholders with the actual Endpoint and Metadata URLs.
  1. In the Endpoint URL field, enter the URL to which Staffbase sends authentication requests to your IdP.
  1. In the Metadata URL field, enter the URL to the IdP metadata file containing necessary SAML configuration information.
  2. Optionally, in the Issuer / Entity ID field, enter the unique identifier for your IdP.
  3. Optionally, configure the following settings as needed:
  4. Click Save.
  1. In the Endpoint URL field, enter the URL to which Staffbase sends authentication requests to your IdP.
  1. In the Client ID field, enter the client ID of the application you registered in your IdP.
  2. In the Secret field, enter the client secret of the application you registered in your IdP.
  3. In the External Attribute Name field, select one of the following attributes to be mapped to the external ID of a Staffbase user:
    • email: The user’s email address. It can serve as a unique identifier if email addresses are consistent and verified.
    • perferred_username: The username used for login. It’s typically more readable but may not be unique across systems.
    • sub: Stands for subject and is a unique, stable identifier assigned by the IdP. It is the most reliable way to identify a user across systems.
  4. Optionally, configure the following settings:
  5. Click Save.

These settings are optional and apply only to SAML configurations.

  1. In the Name ID Policy Format field, enter the format of the NameID element in the SAML assertion.
  1. In the AuthnContext Class Ref field, enter the authentication context used to authenticate the user.
  2. Adjust the toggle to add domain hint.
    Add a domain hint to your authentication request to send users directly to their tenant’s IdP sign-in page. This skips the provider selection step and is especially useful for multitenant applications.
  3. In the Domain Hint Provider ID field, enter the URL of the domain hint used in the authentication request. Example: https://domain.com
  4. In the Domain Hint Name field, enter the domain. Example: domain.com

Use the available toggles to turn on additional SSO settings:

  • Allow User Creation: Automatically create a Staffbase user account when someone logs in via SSO for the first time.
    Allow User Creation is only available when using Staffbase Email as a standalone product. In combined setups with the Intranet or Employee App, create users manually or use another user management method. Contact Staffbase Support or your Customer Success Manager for more information.
  • Disallow User Passwords: Enforce SSO sign-in only.

You can optionally configure user management settings to map custom attributes from your IdP to user profiles in the Staffbase platform based on profile field information. This is useful if you want to map additional user information based on your SSO configuration.

Verify the SSO setup by signing in through your configured method.

  1. In a web browser, enter your Staffbase platform domain URL. For example, https://mycompany.com.
    The Sign In page opens.
  2. Click the new SSO sign-in button with the label you configured.
    You are redirected to your IdP’s sign-in page.
    If you don’t have a valid session with your IdP already, enter your IdP credentials.
  3. If the SSO configuration is successful, you are redirected to your Staffbase account.

You have successfully configured SSO for your Staffbase platform.