Single Sign-On (SSO)
WiseWay supports SAML 2.0 SSO, allowing your team to sign in using your company's identity provider.
Supported Providers
- Okta
- Azure AD (Microsoft Entra ID)
- Google Workspace
- OneLogin
- Any SAML 2.0 compatible provider
Configuration with Okta
- In Okta, go to Applications > Create App Integration
- Choose SAML 2.0 and name it "WiseWay"
- In WiseWay, go to Settings > Single Sign-On and enable SSO
- Copy the ACS URL and Entity ID from WiseWay's Service Provider Details section
- Paste them into Okta's SAML settings:
- Single sign on URL → ACS URL from WiseWay
- Audience URI (SP Entity ID) → Entity ID from WiseWay
- Set Name ID format to
EmailAddressand Application username toEmail - In Okta, go to Sign On > SAML 2.0 > Metadata details and copy the metadata URL
- Download the metadata as an XML file
- In WiseWay, upload the Identity Provider Metadata XML and save
- In Okta, assign users/groups to the WiseWay SSO app
Configuration with Azure AD
- In Azure AD, go to Enterprise Applications > New Application and name it "WiseWay"
- Go to Single Sign-On settings
- In WiseWay, copy the ACS URL and Entity ID from the Service Provider Details section
- In Azure, configure SAML with those values
- Under Attributes & Claims, set the source attribute to
user.mail - Download the Federation Metadata XML from Azure
- Upload it in WiseWay under Settings > Single Sign-On > Identity Provider Metadata XML
- Save and assign users in Azure
Important
- Only assign SSO access to people whose email matches an existing WiseWay team member email
- SSO does not automatically create new user accounts — team members must be invited first via Settings > Team
- When SSO is enabled, team members authenticate through your identity provider instead of using a password