Last updated:

Set up and manage single sign-on (SSO) with SafetyCulture

Learn how to set up and manage SSO for your SafetyCulture organization via the web app, providing users an easier and more secure way to log in to their accounts.

Third-party products can change over time, so some labels or screen layouts in this article may look different in your environment. If you notice anything out of date, use the feedback form at the bottom of this page to let us know.

Why set up SSO?

Single sign-on (SSO) is a great way to reduce site access risks and reduce password fatigue from using different usernames and password combinations. With SafetyCulture, you can set up SSO with any authentication solution that utilizes the Security Assertion Markup Language (SAML) 2.0 standard. This includes some of the most common solutions, such as Active Directory (ADFS, Azure).

If you're on Enterprise Plan, contact your customer success manager for help with SSO, user provisioning, or third-party integrations (Power Automate, Power BI, Zapier). Our customer support team can only provide limited assistance in these areas.

SSO connections are organization-specific. If you’re a part of multiple organizations and want to set up one SSO connection for all your organizations, please contact your Customer Success Manager for assistance.

SSO options

You can set up either SAML or ADFS SSO with one of the following options:

  • Service Provider (SP)-initiated SSO (recommended): A user who tries to log in via SafetyCulture will be automatically redirected to your company's SSO portal for authentication. A successful authentication will automatically redirect the user back to SafetyCulture.

  • Identity Provider (IdP)-initiated SSO: A user who tries to log in via SafetyCulture must start from your company's SSO portal for authentication. A successful authentication will take the user to SafetyCulture.

Set up SSO

  1. Log in to the web app.

  2. Click your organization name on the lower-left corner of the page and select Organization settings.

  3. Select Security on the top of the page.

  4. Click Set up in the "Single sign-on (SSO)" section. Set up single sign-on (SSO) via the web app.

  5. In the pop-up window, enter the email domains that your team uses. Then click Next.

  6. Click Set up. You'll be redirected to the identity provider's setup page to finish setting up your connection.

  7. Click on the lower-right of the screen.

  8. Select which SSO connection you want to use and click Next on the lower-right of the screen.

  9. Configure your connection accordingly.

  10. After setting up your connection, click Create Connection, then click Proceed.

  11. Click Next. If you want to test the connection, click Test Connection to make sure your SSO connection is set up correctly.

  12. Click Enable Connection on the lower-right of the screen.

  13. Return to SafetyCulture and click Okay in the pop-up window.

  14. In the "Single sign-on (SSO)" section, turn "SSO connection" on.

  15. Click Save changes.

After setting up your connection in the service provider’s page, make sure to turn “SSO connection” on in SafetyCulture to allow users to log in using SSO.

Manage SSO

  1. Click your organization name on the lower-left corner of the page and select Organization settings.

  2. Select Security on the top of the page.

  3. In the "Single sign-on (SSO)" section, click Pencil iconEdit. Options to edit and delete when editing an active SSO connection in SafetyCulture.

    • To edit your connection, click Edit SSO connection. You'll be redirected to the identity provider's page to edit the connection.

    • To delete your connection, click Delete SSO connection. In the pop-up window, click Delete.

  4. Click Save changes.

You can only edit and test your connection after migrating to the new SSO domains.

Frequently asked questions

Yes, you can restrict your organization's users to logging in via your SSO provider by setting your SSO login type to "Allow SSO login only".

Yes, you can do so by updating your organization's SSO login type setting to "Enforce SSO for named domains". Once selected, the setting will enforce SSO login based on a user's account email.

  • If a user's email domain matches the ones configured for their organization's SSO connection, they can only log in using their SSO account.

  • If a user's email domain doesn't match the ones configured for their organization's SSO connection, they can log in using their password and still have the option of using their SSO account if it applies to them.

It's likely that you haven't set the "email" attribute or claim in your SAML responses. Please check if you have an attribute called "email" in your SAML responses. If the email in the response isn't called "email", please rename the field to "email".

If the above steps still don't resolve the problem, please reach out to your point of contact from SafetyCulture for assistance.

Once the single sign-on for your organization is set up successfully, you can enable IdP-initiated login via the web app:

  1. Log in to the web app.

  2. Click your organization name on the lower-left corner of the page and select Organization settings.

  3. Select Security on the top of the page.

  4. Click Pencil iconEdit in the "Single sign-on (SSO)" box.

  5. Turn IdP initiated login on. The Identity Provider (IdP)-initiated login setting for single sign-on with SafetyCulture.

  6. Click Save changes.

Please reach out to your point of contact from SafetyCulture for assistance.

No, you don't need to verify the email domains for your organization's SSO to work. However, if you want to use just-in-time (JIT) provisioning for your organization, you'll need to verify the email domains.

While your existing configuration won't be affected, we recommend migrating to the new SSO domains to edit and test your connection.

Yes, the identity provider's setup page can be publicly accessible when you share the link, so other admins on your team can configure the connection.

However, the link expires 10 minutes after it has been generated when setting up or editing a connection. If the link has expired, you can generate a new one by following the same steps.

Need more help?