Panorays supports SAML and OpenID Connect (OIDC) SSO protocols, with both SP-initiated and IDP-initiated login flows, as well as Just-In-Time (JIT) user provisioning.
Benefits of enabling SSO
Securely control which users or groups can access Panorays directly from your IDP
Allow new users to be created seamlessly via their IDP credentials.
Supported Identity Providers (IDPs)
Okta
Azure Active Directory (AD) / ADFS
OneLogin
Auth0
Google
And others
This guide covers setup instructions for major IDPs and generic configuration steps.
1. Okta
Follow the guide on the Okta Marketplace to set up Panorays SSO.
Once setup is complete, send support@panorays.com:
Send the metadata (.xml) file or the link.
Specify the role assigned to users provisioned via SSO.
2. Azure Active Directory
Follow the Microsoft Azure AD SSO guide
Once setup is complete, send support@panorays.com:
Send the metadata (.xml) file or the link.
Specify the role assigned to users provisioned via SSO.
3. SAML Protocol
Add a new application in your IDP using Panorays Service Provider details
Once setup is complete, send support@panorays.com:
Send the metadata (.xml) file or the link.
Specify the role assigned to users provisioned via SSO.
4. OIDC / OpenID Connect Protocol
Set up a new OIDC integration with these details:
Allowed grant types: Authorization Code, Implicit, ID Token
Login redirect URI: https://auth.panoraysapp.com/sso/callback
Initiate login URI: https://www.panoraysapp.com/auth/login/okta
Once setup is complete, send support@panorays.com:
client_id
client_secret
Link to your configuration
Specify the role assigned to users provisioned via SSO.
5. Google
Set up a new Google integration with these details.
For any further questions or completing the set-up, please contact Panorays Support