Skip to main content

Overview

Experio supports enterprise Single Sign-On (SSO) integration, allowing users to authenticate through their organization’s identity provider. This eliminates the need for separate Experio credentials and centralizes access management. Navigate to Admin > Users > SSO Clients.

Supported Identity Providers

ProviderProtocol
OktaSAML / OIDC
Microsoft Entra (Azure AD)SAML / OIDC
Auth0OIDC
GenericSAML / OIDC

Viewing SSO Clients

The SSO clients page shows a table with:
  • Customer ID (unique identifier)
  • Display Name
  • Email Domain
  • IDP Type
  • Active Status
  • Created and Modified dates

Creating an SSO Client

Click Create New to configure a new SSO integration:
FieldDescription
Customer IDA unique identifier for this SSO configuration
Display NameFriendly name shown to administrators
Email DomainThe email domain this SSO applies to (e.g., acme.com). Users with this email domain will be redirected to SSO login.
IDP TypeThe identity provider type (Okta, Microsoft Entra, Auth0, Generic)
PropelAuth Client IDThe client ID from PropelAuth for this integration
ActiveEnable or disable this SSO configuration

How SSO Works

  1. A user navigates to the Experio login page
  2. They enter their email address
  3. If their email domain matches an active SSO client, they’re redirected to their identity provider
  4. After authenticating with their IDP, they’re redirected back to Experio with an active session
  5. User accounts are provisioned automatically on first SSO login

Managing SSO Clients

Editing

Click any SSO client to view and edit its configuration. Changes take effect immediately for new login attempts.

Deactivating

Toggle the Active status to disable an SSO configuration without deleting it. Users for that domain will fall back to email/password authentication.

Deleting

Remove an SSO client permanently. A confirmation dialog prevents accidental deletion.

Audit Trail

Each SSO client tracks:
  • Who created the configuration
  • When it was created
  • When it was last modified
Test SSO configuration with a small group of users before rolling out to the entire organization. Ensure fallback email/password authentication is available during the transition.