Skip to main content
All CollectionsInformation Center
Single Sign-on (SSO) setup
Single Sign-on (SSO) setup

Setup guide to connect Reco to your SSO provider

Reco Product Management avatar
Written by Reco Product Management
Updated over 6 months ago

Connecting to Single Sign-On (SSO) is crucial for improving security and user experience in your organization. Configuring your company domain and choosing an Identity Provider (IdP) form the basis for smooth authentication. This guide simplifies the process, offering clear instructions for setting up SAML applications within your chosen IdP

Navigate to the user management screen

when logging in to the Reco portal, click on configurations -> user management. Scroll down until you see the screen 'Fill in your company SAML domain', similar to the screenshot below

Configure Company Domain

The first step is configuring the tenant's company domain. This domain is utilized during user registration and will automatically map users to the tenant based on the domain in their email address.

Select Identity Provider

You will now select your IdP. You can select one provider with detailed instructions, or configure generic SAML 2.0 directly.

Note: This screenshot could become outdated as more providers are added to this flow over time.

Step Through the Configuration Guide

When configuring SAML using one of the methods that have the instructions guide within the flow, the user will see detailed step-by-step instructions on creating a SAML application within their IdP. The necessary details to configure within the provider are displayed to the user for the applicable tenant for easy copy/paste completion of the IdP configuration.

Once the user has created the application within the IdP, they will fill out the necessary details about the SAML application in the form and click next.

Upon the completion, the user will see the success message below.


​


​

Mapping Email Addresses to Reco Users

Okta

Under the SSO config map, the email address with the custom attribute

Microsoft

Sign in with SAML users

SAML is now configured within your tenant and ready to be used. You can now log out and test signing in with SAML.

Did this answer your question?