Enabling single sign-on with a generic SAML identity provider
Roles and permissions
Only administrators can enable SSO for the organization
Hyperproof supports single sign-on (SSO) with identity providers that are SAML 2.0 compliant. Once SSO is enabled for your organization, Hyperproof users will be able to log in with credentials that are stored and managed by the identity provider, using a custom URL that is specific to your organization.
If your organization is in Hyperproof US, an example of a custom URL is:
https://luna.hyperproof.app
If your organization is in Hyperproof EU, an example of a custom URL is:
https://luna.hyperproof.eu
Before you can configure the generic SAML option, Hyperproof Support needs to provision a subdomain. To get your subdomain, create a support request asking for SSO setup.
Note
If the domain is a .com
address, the subdomain is set as the domain without the .com
suffix.
If the domain is not a .com
address, the subdomain is set as the domain name without the period.
Examples
Domain name | Subdomain |
---|---|
http://acme.com | acme |
http://lunabtechnologies.com | lunabtechnologies |
http://techstartup.io | techstartupio |
http://whitehouse.gov | whitehousegov |
Note
If you have SSO enabled and you invite someone to your organization whose email address is not part of your SSO domain, such as external auditors or contractors, they can't log into Hyperproof via the custom URL provided for SSO. These users must log in using the default URL for your Hyperproof instance. Default Hyperproof URLs include:
Hyperproof US: https://hyperproof.app/
Hyperproof EU: https://hyperproof.eu/
Hyperproof Gov: http://hyperproofgov.app/