PgBeam Docs

SSO (SAML / OIDC)

Configure Single Sign-On for your organization using SAML 2.0 or OpenID Connect. Scale plan only.

Single Sign-On (SSO) lets your team authenticate to PgBeam using your existing identity provider — Okta, Azure AD, Google Workspace, or any SAML 2.0 / OIDC provider. Team members sign in with their corporate credentials instead of managing separate PgBeam passwords.

Scale plan required

SSO requires the Scale plan. See Plans & Pricing for details.

Supported protocols

ProtocolUse case
SAML 2.0Enterprise IdPs (Okta, Azure AD, OneLogin)
OpenID ConnectModern IdPs and custom OAuth2 providers

Choose whichever protocol your identity provider supports. If your IdP supports both, OIDC is generally simpler to configure.

SAML 2.0 setup

Create a SAML application in your IdP

In your identity provider (Okta, Azure AD, Google Workspace, OneLogin, etc.), create a new SAML 2.0 application. Most providers have a "custom SAML app" option.

Get PgBeam's SAML configuration

Go to Settings > Security > Configure SSO in the PgBeam dashboard. You will see two values to copy into your IdP:

FieldDescription
ACS URL (Assertion Consumer Service)Where your IdP sends SAML responses
Entity ID (SP Entity ID)PgBeam's SAML identifier

Configure attribute mapping

Map the following SAML attributes in your IdP. PgBeam uses these to identify users:

SAML attributeRequiredMaps to
email or NameIDYesUser email
firstNameNoDisplay name
lastNameNoDisplay name

Add IdP metadata to PgBeam

Copy your IdP's metadata URL into PgBeam's SSO configuration page and save. PgBeam fetches the IdP certificate, SSO URL, and entity ID from this URL automatically.

If your IdP does not provide a metadata URL, you can paste the metadata XML directly.

Test the connection

Click Test in the PgBeam dashboard to verify the SAML flow. This opens a new window that walks through the full sign-in process. If the test succeeds, you will see a confirmation with the authenticated user's details.

OIDC setup

Create an OIDC application in your IdP

In your identity provider, create a new OpenID Connect (OIDC) application. Choose "Web Application" as the application type.

Configure the redirect URI

Set the redirect URI to the value shown in PgBeam's SSO configuration page (under Settings > Security > Configure SSO).

Add credentials to PgBeam

Copy the following from your IdP into PgBeam:

FieldWhere to find it
Client IDApplication settings in your IdP
Client secretApplication settings in your IdP
Discovery URLUsually https://your-idp.com/.well-known/openid-configuration

PgBeam uses the discovery URL to automatically fetch authorization endpoints, token endpoints, and signing keys.

Test the connection

Click Test in the PgBeam dashboard to verify the OIDC flow. This redirects to your IdP for authentication and confirms the user details returned.

Supported identity providers

SSO works with any SAML 2.0 or OIDC-compliant identity provider. Commonly used providers include:

ProviderSAMLOIDCNotes
OktaYesYesBoth protocols fully supported
Azure AD / Entra IDYesYesUse "Enterprise Application" for SAML
Google WorkspaceYesYesSAML via Admin Console
OneLoginYesYesBoth protocols fully supported
Auth0YesYesUse "Regular Web Application"
JumpCloudYesYesBoth protocols fully supported

Just-in-time provisioning

When a user authenticates via SSO for the first time, PgBeam automatically creates an account for them in your organization with the Member role. This means you do not need to invite users individually — anyone who can authenticate through your IdP is automatically provisioned.

Admins and Owners can change a user's role after they have been provisioned.

SSO enforcement

Once SSO is configured and tested, you can enforce it for your organization. Enforcement means:

  • All organization members must authenticate via SSO
  • Password-based login is disabled for the organization
  • Existing sessions are invalidated when enforcement is enabled
  • New invitations require the recipient to sign in via SSO

Owner recovery

Organization owners retain the ability to log in with email/password even when SSO enforcement is enabled. This serves as a recovery mechanism in case the IdP is unavailable or misconfigured.

Enable enforcement

Go to Settings > Security in the dashboard. After configuring SSO, toggle Require SSO for all members. Confirm the action — all non-owner members will be signed out immediately.

Troubleshooting

SAML issues

ProblemLikely causeFix
"Invalid ACS URL" errorACS URL mismatch between IdP and PgBeamCopy the exact ACS URL from PgBeam
"Audience mismatch" errorEntity ID mismatchVerify SP Entity ID matches in both systems
User lands on error pageAttribute mapping missing emailEnsure email or NameID is mapped
Certificate validation failedIdP certificate rotatedRe-import the metadata URL in PgBeam

OIDC issues

ProblemLikely causeFix
"Invalid redirect URI"Redirect URI mismatchCopy the exact redirect URI from PgBeam
"Invalid client" errorWrong client ID or secretRe-copy credentials from your IdP
Discovery URL failsURL is incorrect or not publicly reachableVerify the URL returns JSON in a browser

General issues

ProblemLikely causeFix
Users can still use passwordsSSO enforcement not enabledToggle "Require SSO" in Security settings
New user gets wrong roleDefault JIT role is MemberChange role after provisioning
IdP is down and nobody can log inSSO enforcement is enabledOwner can log in with email/password and disable enforcement

Further reading

On this page