Single Sign-On (SSO) Setup
Availability: Enterprise tier. Coordinate with your security team before enabling.
What SSO does
- Uses your IdP (Okta, Azure AD, Google Workspace, etc.) for authentication.
- Lets you enforce MFA and session policies centrally.
- Keeps access logs aligned to your access control program.
Requirements
- Enterprise subscription and admin access in StartupVision.
- Admin rights in your IdP to create an app/integration.
- SAML 2.0 or OIDC client credentials.
SAML quickstart
- In your IdP, create a new SAML app.
- ACS/Callback URL:
https://startupvision.ai/sso/callback
- Entity ID/Audience:
https://startupvision.ai/sso
- Attributes: email (required), name (optional).
- Download IdP metadata (XML) or note: Issuer, SSO URL, x509 cert.
- In StartupVision (Enterprise admin), upload metadata or paste: Issuer, SSO URL, x509 cert. Save.
- Test with a non-admin account before rolling out.
OIDC quickstart
- In your IdP, register a confidential client.
- Redirect URI:
https://startupvision.ai/sso/oidc/callback
- Scopes:
openid email profile
- Copy client ID and client secret.
- In StartupVision (Enterprise admin), add issuer URL, client ID, and secret. Save.
- Test with a non-admin account.
Best practices
- Require MFA in your IdP.
- Map groups/roles in your IdP and review periodically.
- Pair with Audit Logs for evidence; keep retention aligned to your policy.
- Disable local login for users after successful rollout (optional, by request).
Troubleshooting
- 403/unauthorized: confirm ACS/redirect URL matches exactly.
- Missing email claim: ensure IdP sends primary email attribute.
- Clock skew: verify IdP and StartupVision clocks via NTP.
- Still stuck? Contact support with request ID/time of failure.