Skip to main content

Single Sign-On configuration

Invicti Platform supports Single Sign-On (SSO) via Security Assertion Markup Language (SAML), allowing users to access multiple applications with a single login. An Identity Provider (IdP) centralizes user and application management, eliminating the need to handle individual credentials for each service. Invicti supports both IdP- and Service Provider(SP)-initiated SAML authentication.

This document explains how to enable SSO in Invicti Platform.

info

Enabling SSO in Invicti doesn't automatically provision users by default. You must add them manually or use automatic provisioning with SAML/SCIM from specific SSO providers (Active Directory Federation Service, Entra ID, Google, Okta, OneLoginSecure, and PingIdentity). For more information on manual user creation, refer to the Create user document.

You must also configure the integration on your SSO provider. For detailed instructions, refer to your SSO provider's documentation in the following:

Configure Single Sign-On settings

warning

To access the SSO configuration you need to be an Owner of the organization or have a custom role with System rights. Enabling SSO makes it mandatory for the whole organization, unless you exempt a user.

  1. Select Settings from the left-side menu.
  2. In the Security & access control section select SSO & Provisioning.
  3. Turn on the Enable SSO toggle.
SSO settings page in Invicti Platform showing Enable SSO toggle.SSO settings page in Invicti Platform showing Enable SSO toggle.
  1. From the SSO Provider drop-down list, choose your SSO provider.
  2. Copy the information from the SAML 2.0 Service URL and Identifier fields and enter it into your SSO provider configuration.
Copy SAML 2.0 Service URL and Identifier values to your SSO provider configuration.Copy SAML 2.0 Service URL and Identifier values to your SSO provider configuration.
  1. Enter the required information into the SAML 2.0 Endpoint, IdP Identifier, and X.509 Certificate fields.
Copy the values of SAML 2.0 Endpoint, IdP Identifier, X.509 Certificate from your SSO provider to Invicti Platform.Copy the values of SAML 2.0 Endpoint, IdP Identifier, X.509 Certificate from your SSO provider to Invicti Platform.
  1. Choose the signed assertions, encrypted assertions, or sign requests checkboxes as needed.
Additional security options for assertions and sign requests in Invicti Platform.Additional security options for assertions and sign requests in Invicti Platform.
  1. If you enable any assertions or requests, a new section appears to do one of the following:
    • Choose Generate a new certificate; OR
    • Choose I have an existing certificate, then upload your certificate and enter the Certificate Password.
Certificate-related fields for encrypted assertions and sign requests.Certificate-related fields for encrypted assertions and sign requests.
  1. From the SSO Exemptions drop-down, choose specific users to exempt them from SSO. Doing this means the selected users can log in to Invicti Platform using password. The Owner is always exempted, while all other users are forced to use SSO when it's enabled.
SSO Exemptions field in Invicti Platform.SSO Exemptions field in Invicti Platform.
  1. Click Save to save your settings and add the users manually.

To add the users automatically, based on your SSO provider, continue to configure automatic provisioning section both in Invicti Platform (in the following section) and the provider's administration tool.

Configure automatic provisioning with SAML/SCIM

Auto-provisioning availability

You need permission to manage Users to configure automatic provisioning.

Invicti Platform supports automatic user provisioning via SAML/SCIM for specific SSO providers. This feature automatically creates new user accounts when they authenticate through the Identity Provider, eliminating the need to manually add users to the platform.

Required SAML attributes

For auto-provisioning to work, your Identity Provider must send the following attributes in the SAML assertion:

AttributeDescriptionExpected format
EmailAddressUser's email addressPlain string
FirstNameUser's first namePlain string
LastNameUser's last namePlain string
Missing required attributes

If any required attributes are missing from the SAML assertion, Invicti rejects the login and doesn't create a user.

Configure provisioning settings

  1. In the Provisioning with SAML/SCIM section, set the Enable automatic provisioning for your organization toggle to Yes.
Enable automatic provisioning toggle in Invicti Platform.Enable automatic provisioning toggle in Invicti Platform.
  1. In the Default access for new users and teams section, select a role from the Role drop-down to assign to newly provisioned users.
  2. Optionally, click Select collections to choose which collections the new users can access. If none are selected, new users get access to all current and future collections by default.
Default access configuration for automatically provisioned users.Default access configuration for automatically provisioned users.
  1. Optionally, click Download SAML Metadata to download the file for your IdP configuration.
  2. Click Save to apply your provisioning settings.

Once you enable automatic provisioning, Invicti Platform automatically creates accounts for new users who successfully authenticate through your Identity Provider, with the default role and collection access you configured.

Editing details

To change a user's first name, last name, and email edit their profile in your Identity Provider. To edit a user's role and access to collections, refer to the Edit, delete, or suspend user document.

Auto-provisioning behavior

When a user authenticates through your Identity Provider, Invicti Platform handles the request based on the following conditions:

ConditionOutcome
User with matching email already exists in the tenantUser is logged in. Email matching is case-insensitive. No duplicate account is created.
User doesn't exist in the tenantNew user account is created with the default role configured in Default access for new users and teams.
Required SAML attributes are missingLogin is rejected. No user is created. Error message "We encountered some issue with SSO login, please contact your administrator (and check whether e.g. configuration/certificate is still valid.)" is displayed.
Auto-provisioning is disabledLogin is denied for users who don't have an existing account. No user is created.

Need help?

Invicti Support team is ready to provide you with technical help. Go to Help Center

Was this page useful?