WiseWay Help CenterContact
Help CenterAccountSingle Sign-On (SSO)

Single Sign-On (SSO)

WiseWay supports SAML 2.0 SSO, allowing your team to sign in using your company's identity provider.

Supported Providers

  • Okta
  • Azure AD (Microsoft Entra ID)
  • Google Workspace
  • OneLogin
  • Any SAML 2.0 compatible provider

Configuration with Okta

  1. In Okta, go to Applications > Create App Integration
  2. Choose SAML 2.0 and name it "WiseWay"
  3. In WiseWay, go to Settings > Single Sign-On and enable SSO
  4. Copy the ACS URL and Entity ID from WiseWay's Service Provider Details section
  5. Paste them into Okta's SAML settings:
    • Single sign on URL → ACS URL from WiseWay
    • Audience URI (SP Entity ID) → Entity ID from WiseWay
  6. Set Name ID format to EmailAddress and Application username to Email
  7. In Okta, go to Sign On > SAML 2.0 > Metadata details and copy the metadata URL
  8. Download the metadata as an XML file
  9. In WiseWay, upload the Identity Provider Metadata XML and save
  10. In Okta, assign users/groups to the WiseWay SSO app

Configuration with Azure AD

  1. In Azure AD, go to Enterprise Applications > New Application and name it "WiseWay"
  2. Go to Single Sign-On settings
  3. In WiseWay, copy the ACS URL and Entity ID from the Service Provider Details section
  4. In Azure, configure SAML with those values
  5. Under Attributes & Claims, set the source attribute to user.mail
  6. Download the Federation Metadata XML from Azure
  7. Upload it in WiseWay under Settings > Single Sign-On > Identity Provider Metadata XML
  8. Save and assign users in Azure

Important

  • Only assign SSO access to people whose email matches an existing WiseWay team member email
  • SSO does not automatically create new user accounts — team members must be invited first via Settings > Team
  • When SSO is enabled, team members authenticate through your identity provider instead of using a password

More in Account

Custom DomainTeam Management
© 2026 WiseWay. All rights reserved.