# Set Up Single Sign-On (SSO)

In this guide, you will configure Single Sign-On (SSO) to allow your users to access Radiant Security through your Identity Provider (IdP). Setting up SSO ensures a secure and streamlined login experience, while centralizing authentication and access management.

### Supported Identity Providers

We currently support SSO with the following Identity Providers:

* [Okta](#configure-sso-for-okta)
* [Google](#configure-sso-for-google)
* [Microsoft Entra ID](#configure-sso-for-microsoft-entra-id)

{% hint style="info" %}
Once SSO is configured, it is automatically enforced for all users. If you ever need to bypass SSO (for example, in an emergency), we provide a “break‑glass” option that allows temporary SSO bypass. To use this option, simply contact our support team.
{% endhint %}

### Configure SSO for Okta

Use Okta as your SSO provider to let users access Radiant securely and easily, with centralized identity management and enforcement of your organization’s authentication policies.

Configure Okta as a SAML 2.0 identity provider for Radiant, so your users can authenticate via your company’s Okta portal.

#### Prerequisites

* [ ] Admin access to Okta Admin Console

#### Create SAML application

1. Log in to the **Okta Admin Dashboard**, then click **Applications.**&#x20;

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FOoZb6zjdGh7gjUYjzowW%2FConfigure%20Single%20Sign-On%20(SSO)_Okta_01.png?alt=media&#x26;token=6bb6fa47-8960-47d2-b265-6ae44c2cc3e9" alt="" width="563"><figcaption></figcaption></figure></div>
2. Click **Create App Integration**.

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FoFkZyX4ZcGftCaMal1sA%2FConfigure%20Single%20Sign-On%20(SSO)_Okta_02.png?alt=media&#x26;token=8167c816-a8b2-4465-bae6-07c1055d738d" alt="" width="563"><figcaption></figcaption></figure></div>
3. Select **SAML 2.0** as the sign-in method and click **Next**.

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2F7gDAe8J0Ymf7cyXKQ476%2FConfigure%20Single%20Sign-On%20(SSO)_Okta_03.png?alt=media&#x26;token=a919c897-4167-4350-ae8b-adb225bcca7a" alt="" width="563"><figcaption></figcaption></figure></div>
4. Name the app (e.g., `Radiant`) and click **Next**.

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FLgQGGoNQYjsILZrECQct%2FConfigure%20Single%20Sign-On%20(SSO)_Okta_04.png?alt=media&#x26;token=55e295c0-941b-40da-9f0e-cd0c032c052f" alt="" width="563"><figcaption></figcaption></figure></div>
5. In the **SAML Settings** section:

   * **Single sign-on URL**: The value is provided by Radiant in the setup.
   * **SP Entity ID (Audience URI)**: The value is provided by Radiant in the setup.
   * **Name ID format**: `EmailAddress`&#x20;

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FOfgz19WYQ0oqkC7zuKZO%2FConfigure%20Single%20Sign-On%20(SSO)_Okta_05.png?alt=media&#x26;token=1fdda2d5-ddf3-4815-bcb5-96bdfb157de8" alt="" width="563"><figcaption></figcaption></figure></div>

#### Assign users or groups

1. Go to the **Assignments** tab of the app.
2. Click **Assign >** **Assign to Groups** and select the groups that should have access to Radiant via SSO.&#x20;

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FMtZu5B0GOBnmpRKaPexZ%2FConfigure%20Single%20Sign-On%20(SSO)_Okta_06.png?alt=media&#x26;token=c4928d3b-d379-40c0-a239-f66b746bac85" alt="" width="563"><figcaption></figcaption></figure></div>

#### Submit metadata to Radiant

To complete the setup, send us your identity provider metadata.

1. In the Okta's **Sign On** tab, scroll to the **SAML Signing Certificates** section.
2. Click **View SAML setup instructions**.
3. Copy the **Identity Provider Metadata URL**.

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FNSWy4IZhAUxYIyYu4cfM%2FConfigure%20Single%20Sign-On%20(SSO)_Okta_07.png?alt=media&#x26;token=9b71faab-de63-4483-93a5-667e803edf59" alt="" width="563"><figcaption></figcaption></figure></div>

### Configure SSO for Google

Use Google as your SSO provider to let users access Radiant securely and easily, with centralized identity management and enforcement of your organization’s authentication policies.

Configure Google as a SAML 2.0 identity provider for Radiant, so your users can authenticate via your company’s Google portal.

#### Prerequisites

* [ ] Write access to Google Workspace Admin Console

#### Create a SAML application

1. Log in to your **Google Workspace dashboard** and click **Web and mobile apps** in the sidebar.&#x20;

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FaRsR8b9nNmEJTzOTMiv4%2FConfigure%20Single%20Sign-On%20(SSO)_Google_01.png?alt=media&#x26;token=5ca72da0-7a5f-48b2-8aca-9e32dd94ba21" alt="" width="563"><figcaption></figcaption></figure></div>
2. Click **Add app** and click **Add custom SAML app**.

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FmJaEfoGDsjKKXkwuCoo6%2FConfigure%20Single%20Sign-On%20(SSO)_Google_02.png?alt=media&#x26;token=e9f43311-103b-47fc-b2a1-ad3a46e2b6f3" alt="" width="563"><figcaption></figcaption></figure></div>
3. Enter the name of your application (e.g., `Radiant Security`), then click **Continue**.&#x20;

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2F20NcEyCYKm7EyXY9orkP%2FConfigure%20Single%20Sign-On%20(SSO)_Google_03.png?alt=media&#x26;token=a27f307c-f29a-4824-a8c3-3776543a2393" alt="" width="563"><figcaption></figcaption></figure></div>
4. Skip to the next screen by clicking **Continue**.

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FJNwBs77tT7YuDjwTWUbX%2FConfigure%20Single%20Sign-On%20(SSO)_Google_04.png?alt=media&#x26;token=fe5ed39a-cab5-4a54-9f06-cd653dba4efa" alt="" width="563"><figcaption></figcaption></figure></div>
5. Copy the **ACS URL** and **Entity ID** values from Radiant’s SSO setup and paste these values into Google’s. The **Name ID** format should be `EMAIL`.

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FiSFQsTufTwHGg9Sdp4vZ%2FConfigure%20Single%20Sign-On%20(SSO)_Google_05.png?alt=media&#x26;token=976a7624-72b5-4d84-b84a-ee5016de4342" alt="" width="563"><figcaption></figcaption></figure></div>

#### Assign users or groups

1. Under **Service status**, enable **ON for everyone** for the SAML application you just created.
2. Click **Save**.&#x20;

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2F3yVWUkvSpl2FDvL22bCw%2FConfigure%20Single%20Sign-On%20(SSO)_Google_06.png?alt=media&#x26;token=f7577fce-f65b-423a-90d7-ac01d138de06" alt="" width="563"><figcaption></figcaption></figure></div>

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FRA36Zdfi4DZ1XqYYJor1%2FConfigure%20Single%20Sign-On%20(SSO)_Google_07.png?alt=media&#x26;token=9897dff4-4768-497b-b52e-c937bec015b6" alt="" width="563"><figcaption></figcaption></figure></div>

#### Submit metadata to Radiant

To complete the implementation of SAML SSO, you need to provide Radiant with your identity provider’s details.

1. Click **Download metadata.**

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FhHE8fL5xymmCg4K4CYzi%2FConfigure%20Single%20Sign-On%20(SSO)_Google_08.png?alt=media&#x26;token=f837fe4c-0c93-41f5-8e2f-a4a3b384189e" alt="" width="563"><figcaption></figcaption></figure></div>
2. Upload the **Metadata** **file** downloaded from the previous step into Radiant.&#x20;

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FjPh037xfbusZGxFmyHaT%2FConfigure%20Single%20Sign-On%20(SSO)_Google_09.png?alt=media&#x26;token=06863f10-9a12-4676-a9e0-5e2ce4963340" alt="" width="563"><figcaption></figcaption></figure></div>

### Configure SSO for Microsoft Entra ID

Use Entra ID as your SSO provider to let users access Radiant securely and easily, with centralized identity management and enforcement of your organization’s authentication policies.

Configure Entra ID as a SAML 2.0 identity provider for Radiant, so your users can authenticate via your company’s Entra ID portal.

#### Prerequisites

* [ ] Admin access to Azure Portal

#### Create SAML application

1. Go to Azure Portal, open the portal menu and select **Enterprise applications**.&#x20;

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FmSLpscS59C9XTDVDtIzP%2FConfigure%20Single%20Sign-On%20(SSO)_Microsoft_01.png?alt=media&#x26;token=6451f02d-3909-4515-8ac3-5d9582094de9" alt="" width="563"><figcaption></figcaption></figure></div>
2. Click **New application**.

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FoID2UrUGrRZNs1uDeJCg%2FConfigure%20Single%20Sign-On%20(SSO)_Microsoft_02.png?alt=media&#x26;token=5189c9eb-9570-49fe-9e88-a7fa5d79694b" alt="" width="563"><figcaption></figcaption></figure></div>
3. Click **Create your own application**.

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FiqvjxcJxIHDO3QNW11Bh%2FConfigure%20Single%20Sign-On%20(SSO)_Microsoft_03.png?alt=media&#x26;token=6d24a9d9-dde3-4f38-83cf-8cdddf3df681" alt="" width="563"><figcaption></figcaption></figure></div>
4. Provide a name for your app (e.g., `Radiant Security`), select **Integrate any other application you don't find in the gallery (Non-gallery)**, and click **Create**.

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FgYwCb4jFO4EfzacwQvA2%2FConfigure%20Single%20Sign-On%20(SSO)_Microsoft_04.png?alt=media&#x26;token=0e6392c7-0a73-47d5-b950-296e671f31f2" alt="" width="563"><figcaption></figcaption></figure></div>
5. In the **Overview** page, select **Set up single sign on**.

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2Fveg3GQz7MQCQNC2iFgeP%2FConfigure%20Single%20Sign-On%20(SSO)_Microsoft_05.png?alt=media&#x26;token=7e081303-2007-4ef0-b5d5-c55eff8e81b4" alt="" width="563"><figcaption></figcaption></figure></div>
6. Select **SAML**.

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FqaXuFnE0Fj6j2cc66p8T%2FConfigure%20Single%20Sign-On%20(SSO)_Microsoft_06.png?alt=media&#x26;token=c5f72d39-7667-42bf-8896-7e7d4b6ce943" alt="" width="563"><figcaption></figcaption></figure></div>
7. Click **Edit**.

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2F8qRtXPTurS9mBJuGNbbv%2FConfigure%20Single%20Sign-On%20(SSO)_Microsoft_07.png?alt=media&#x26;token=8a094a7d-d146-40b2-8506-47eb5d6351e0" alt="" width="563"><figcaption></figcaption></figure></div>
8. Copy the **Reply URL** and **Identifier** values from Radiant’s SSO setup and paste these values into Azure's **Basic SAML Configuration**.

   <figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2F96JJDeP9kRhd19fqAycF%2FConfigure%20Single%20Sign-On%20(SSO)_Microsoft_08.png?alt=media&#x26;token=8b1ade95-232c-4cac-b8c6-59afdcc3c235" alt=""><figcaption></figcaption></figure>

#### Assign users or groups

After creating the enterprise application, you should proceed to assign individual users or groups so that they can authenticate using SAML.

1. Select **Users and groups** from the left menu.

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FGxKOeNzk1zINQN1eWrkV%2FConfigure%20Single%20Sign-On%20(SSO)_Microsoft_09.png?alt=media&#x26;token=263228c8-b46d-4f77-94cc-eb65533d6e8f" alt="" width="563"><figcaption></figcaption></figure></div>
2. Click **Add user/group**.

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2Fgt8d08EERYz7jaYfCFOh%2FConfigure%20Single%20Sign-On%20(SSO)_Microsoft_10.png?alt=media&#x26;token=a837a474-ab32-4040-a934-741cdea040d7" alt="" width="563"><figcaption></figcaption></figure></div>
3. Click **None Selected**.

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FESicGi5qG1TPhjVsKevz%2FConfigure%20Single%20Sign-On%20(SSO)_Microsoft_11.png?alt=media&#x26;token=5c07be28-43e5-42dc-87c2-3f7903984e48" alt="" width="563"><figcaption></figcaption></figure></div>
4. Search for the user or group you wish to add and click **Select**.&#x20;

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FJTbFQgfGuoZuPkx6s1FR%2FConfigure%20Single%20Sign-On%20(SSO)_Microsoft_12.png?alt=media&#x26;token=f0b78898-f52d-4ce4-8ad0-cce74d6bd688" alt="" width="563"><figcaption></figcaption></figure></div>
5. Click **Assign**.

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2F4McLV7ILt3PojbUGk6Nk%2FConfigure%20Single%20Sign-On%20(SSO)_Microsoft_13.png?alt=media&#x26;token=4a38a502-5553-457c-b979-4cedf01af79a" alt="" width="563"><figcaption></figcaption></figure></div>

#### Submit metadata to Radiant

To complete the implementation of SAML SSO, you need to provide Radiant with your identity provider’s details.

1. Click on the **Single sign-on** from the left menu.
2. Locate **App Federation Metadata Url** under **SAML Signing Certificates.**
3. Select **Copy** to copy the link, then paste it into Radiant.
