Single Sign-On (SSO)
What is SSO?
Single Sign-On allows your team to sign in to Tripl-i using their existing corporate credentials — the same username and password they use for Microsoft 365, Google Workspace, or your organization's identity provider. No separate passwords to remember.
Why Use SSO?
- One password for everything — Users sign in with their existing corporate credentials
- Stronger security — Leverage your organization's multi-factor authentication (MFA)
- Automatic access control — When you disable a user in your identity provider, they lose access to Tripl-i immediately
- Compliance — Centralized authentication meets SOX, HIPAA, and PCI-DSS requirements
- Less IT overhead — No password reset tickets for Tripl-i
Supported Identity Providers
| Provider | Best For |
|---|---|
| Microsoft Entra ID (Azure AD) | Organizations using Microsoft 365, Azure |
| Google Workspace | Organizations using Google Workspace |
| Custom OIDC | Any OpenID Connect compatible provider (Okta, Auth0, OneLogin, etc.) |
How SSO Works for Users
Once SSO is configured, the sign-in experience changes:
- Enter your email address and click Continue
- Tripl-i detects your organization uses SSO
- Click Sign in with Microsoft (or Google)
- You're redirected to your organization's login page
- Sign in with your corporate credentials (+ MFA if configured)
- You're automatically redirected back to Tripl-i — signed in
SSO users don't need a separate Tripl-i password. Your organization's MFA (multi-factor authentication) is trusted, so you won't be asked for a second Tripl-i 2FA code.
Setting Up SSO
Prerequisites
Before you begin, you'll need:
- Tenant Admin role in Tripl-i
- Admin access to your identity provider (Microsoft Entra, Google Admin, etc.)
- Your organization's email domain (e.g.,
yourcompany.com)
Step 1: Open SSO Settings
- Sign in to Tripl-i as a Tenant Admin
- Navigate to Settings in the sidebar
- Click Single Sign-On (SSO)
Step 2: Choose Your Provider
Select your identity provider:
- Microsoft Entra ID — for Microsoft 365 organizations
- Google Workspace — for Google Workspace organizations
- Custom OIDC — for other identity providers
Microsoft Entra ID Setup
In the Microsoft Entra Admin Center
- Go to Microsoft Entra Admin Center
- Navigate to Applications → App registrations → New registration
- Configure the app:
- Name:
Tripl-i Platform - Supported account types: Accounts in this organizational directory only
- Redirect URI: Copy the callback URL shown in Tripl-i SSO settings
- Production:
https://api.tripl-i.com/api/auth/sso/callback
- Production:
- Name:
- Click Register
- Copy the Application (client) ID — you'll need this
- Copy the Directory (tenant) ID — you'll need this
- Go to Certificates & secrets → New client secret
- Description:
Tripl-i SSO - Expiry: 24 months (recommended)
- Click Add and immediately copy the Value (you won't see it again)
- Description:
- Go to API permissions → Verify these are present:
openidemailprofile
In Tripl-i SSO Settings
- Select Microsoft Entra ID as the provider
- Enter your Entra Tenant ID (Directory ID from step 6 above)
- Enter the Client ID (Application ID from step 5)
- Enter the Client Secret (Value from step 7)
- Add your Email Domain (e.g.,
yourcompany.com) - Click Test Connection to verify everything works
- Toggle Enable SSO to ON
- Click Save
You can add multiple email domains if your organization uses more than one (e.g., yourcompany.com and yourcompany.co.uk).
Google Workspace Setup
In Google Cloud Console
- Go to Google Cloud Console
- Select or create a project
- Navigate to APIs & Services → Credentials
- Click Create Credentials → OAuth client ID
- Configure:
- Application type: Web application
- Name:
Tripl-i Platform - Authorized redirect URIs: Add the callback URL from Tripl-i SSO settings
- Production:
https://api.tripl-i.com/api/auth/sso/callback
- Production:
- Click Create
- Copy the Client ID and Client Secret
- Go to APIs & Services → Library → Enable Google People API
In Tripl-i SSO Settings
- Select Google Workspace as the provider
- Enter the Client ID
- Enter the Client Secret
- Add your Email Domain (e.g.,
yourcompany.com) - Click Test Connection
- Toggle Enable SSO to ON
- Click Save
Custom OIDC Provider Setup
For identity providers like Okta, Auth0, OneLogin, or any OIDC-compliant system:
- In your IdP, create a new OIDC application
- Set the Redirect URI to the callback URL shown in Tripl-i SSO settings
- Note the Client ID, Client Secret, and Discovery URL
- The discovery URL typically ends with
/.well-known/openid-configuration
- The discovery URL typically ends with
- In Tripl-i SSO settings:
- Select Custom OIDC
- Enter the Discovery URL
- Enter Client ID and Client Secret
- Add your Email Domain
- Test and enable
Partner Portal SSO
SSO works identically in the Partner Portal. If SSO is configured for your organization:
- Partners sign in at the Partner Portal login page
- Enter email → detected as SSO → redirected to your IdP
- After authentication, redirected back to the Partner Portal dashboard
No additional configuration needed — the same SSO setup covers both the main app and the Partner Portal.
Managing SSO
Adding Email Domains
You can associate multiple email domains with your SSO configuration. All users with matching email domains will be directed to SSO.
- Go to Settings → SSO
- In the Email Domains section, type a new domain and press Enter
- Click Save
Disabling SSO
If you need to disable SSO temporarily:
- Go to Settings → SSO
- Toggle Enable SSO to OFF
- Click Save
Users will fall back to password-based login. Their Tripl-i passwords remain valid.
Rotating Client Secrets
When your IdP client secret expires:
- Generate a new secret in your identity provider
- Go to Tripl-i Settings → SSO
- Enter the new Client Secret
- Click Test Connection to verify
- Click Save
Update the secret before the old one expires to avoid login interruptions.
Frequently Asked Questions
Q: Do users need a Tripl-i password if SSO is enabled? A: No. SSO users authenticate entirely through your identity provider. They don't need a separate Tripl-i password.
Q: What happens if SSO goes down? A: Users can still sign in with their Tripl-i password if they have one set. You can also disable SSO temporarily in Settings to force password login.
Q: Is multi-factor authentication (MFA) supported? A: Yes — Tripl-i trusts your identity provider's MFA. If your organization enforces MFA in Entra ID or Google, that MFA applies to Tripl-i sign-ins too.
Q: Can I use SSO for some users and passwords for others? A: Yes. SSO is based on email domain. Users whose email domain matches the SSO configuration use SSO. Others use password login.
Q: Does SSO work with the Partner Portal? A: Yes. The same SSO configuration applies to both the main Tripl-i app and the Partner Portal.
Q: How do I know if SSO is working? A: Use the Test Connection button in SSO settings. It verifies connectivity to your identity provider without affecting users.
Q: Can I have SSO for multiple identity providers? A: Currently, each tenant supports one SSO configuration. If you need multiple providers, contact support.
Troubleshooting
| Issue | Solution |
|---|---|
| "SSO not configured" error | Verify the email domain matches your SSO configuration |
| Redirect loop after sign-in | Check the callback URL in your IdP matches exactly |
| "No account found" after SSO | The user needs a Tripl-i account with the same email address |
| "Account disabled" error | Re-enable the user in Tripl-i Settings → Users |
| Test Connection fails | Verify Client ID, Secret, and Discovery URL are correct |
| Secret expired | Generate a new secret in your IdP and update in SSO settings |