Skip to main content

Single Sign-On (SSO) Setup Guide

Updated over a week ago

Panorays supports SAML and OpenID Connect (OIDC) SSO protocols, with both SP-initiated and IDP-initiated login flows, as well as Just-In-Time (JIT) user provisioning.

Benefits of enabling SSO

  • Securely control which users or groups can access Panorays directly from your IDP

  • Allow new users to be created seamlessly via their IDP credentials.

Supported Identity Providers (IDPs)

  • Okta

  • Azure Active Directory (AD) / ADFS

  • OneLogin

  • Auth0

  • Google

  • And others

This guide covers setup instructions for major IDPs and generic configuration steps.


1. Okta

  1. Follow the guide on the Okta Marketplace to set up Panorays SSO.

  2. Once setup is complete, send support@panorays.com:

    • Send the metadata (.xml) file or the link.

    • Specify the role assigned to users provisioned via SSO.


2. Azure Active Directory

  1. Once setup is complete, send support@panorays.com:

    • Send the metadata (.xml) file or the link.

    • Specify the role assigned to users provisioned via SSO.


3. SAML Protocol

  1. Add a new application in your IDP using Panorays Service Provider details

  2. Once setup is complete, send support@panorays.com:

    • Send the metadata (.xml) file or the link.

    • Specify the role assigned to users provisioned via SSO.


4. OIDC / OpenID Connect Protocol

  1. Set up a new OIDC integration with these details:

  2. Once setup is complete, send support@panorays.com:

    • client_id

    • client_secret

    • Link to your configuration

    • Specify the role assigned to users provisioned via SSO.


5. Google

  1. Set up a new Google integration with these details.

For any further questions or completing the set-up, please contact Panorays Support

Did this answer your question?