Single Sign-On (SSO)
Learn how to configure Single Sign-On (SSO) in Ternary, including setup steps for Okta, Google Workspace, and Microsoft Entra ID.
Ternary supports enterprise Single Sign-On (SSO) to centralize authentication and user provisioning across the platform. SSO integrations allow organizations to enforce identity policies through their existing identity provider while controlling how users are created, authenticated, and authorized within a Ternary tenant.
Ternary supports SAML-based integrations with major identity providers, including Okta, Google Workspace, and Microsoft Entra ID. Each integration enables authenticated access, optional auto-provisioning, and role or scope assignment based on identity attributes.
SSO configuration requires coordination with Ternary Customer Success to establish a secure connection between the identity provider and the tenant before setup begins.
Okta SSO Configuration with Ternary
Ternary’s Okta integration enables centralized authentication and automated user provisioning using SAML. Once configured, all access to Ternary is authenticated through Okta, ensuring consistent identity control and governance.
- The integration supports automatic user provisioning on first login, with roles and Scoped Views optionally assigned based on Okta group membership.
Ternary recommends using an app-initiated authentication flow. In this model, users launch Ternary from an Okta application shortcut, enter their email address on the Ternary login screen, and are redirected back to Okta to complete SAML authentication. This approach ensures consistent identity verification while maintaining compatibility with Okta-managed access policies.
Additional context on this flow is available in Auth0 documentation for IdP-initiated SSO.
If Okta groups are used to assign roles or Scoped Views, group attributes must be passed in the SAML assertion. Ensure group attribute mappings are configured before proceeding.
Prerequisites
Before configuring Okta SSO for Ternary, ensure the following requirements are met:
- An Okta Super Admin role is available to create and assign both SAML and Bookmark applications.
- A corporate email domain that matches the domain used to provision users in Okta. Only one email domain and one SSO integration are supported per Ternary tenant.
- A Connection Name provided by Ternary Customer Success. This value follows the format
yourcompanyname-samland must be used consistently across the Okta configuration. Contact Customer Success to obtain this before starting the setup.
Create the SAML Chiclet
This step creates a hidden SAML chiclet in Okta that handles authentication for Ternary. This chiclet is not user-facing and should not be visible to end users.
- Log in to the Okta Admin Console and create a new SAML integration. Refer to Okta documentation if needed.
- Configure the application with the following values:
- App name: Ternary SAML
- App visibility: Do not display application icon to users
- Logo: Optional (recommended to leave blank)
- Configure the SAML settings with the following values:
- Single sign-on URL: https://auth.ternary.app/login/callback?connection=yourcompanyname-saml
- Audience URI (SP Entity ID): urn:auth0:ternary:yourcompanyname-saml
- Default RelayState: Leave blank
- Name ID format: Unspecified
- Application username: Email
- Update application username on: Create and update
- Do not modify any advanced settings.
- Attribute Statements:
- Transfer user's first and last name to Ternary as a SAML attribute Name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name Name format: Unspecified Value: user.firstName + " " + user.lastName
- Hit Add Another for a second mapping. This one will transfer the user's email address to Ternary as a SAML attribute. Name:http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress Name format: Unspecified Value: user.email
- If Okta groups are used to assign roles or Scoped Views in Ternary, add an additional attribute mapping to pass group information in the SAML assertion. This mapping ensures that a user’s Okta group memberships are sent to Ternary during authentication. Configure the group attribute as follows: Name: Enter the group attribute name defined in your SAML application Name format: Unspecified Value: OktaGroupName
- Preview the SAML assertion to confirm attributes are correctly populated and contain no formatting errors.
- Complete the application setup and mark it as an internal app.
Gather Information to Share with Ternary
To complete the SSO setup, Ternary requires a few details from the SAML application you just created in Okta. From the SAML app:
- Open the Sign On tab.
- Scroll to SAML Setup Instructions.
- Collect the following values:
- Identity Provider Single Sign-On URL
- Identity Provider Issuer
- X.509 Certificate Share these details with Ternary Customer Success, who will finalize the SSO configuration and bind it to your tenant.
Create the Bookmark Chiclet
The bookmark chiclet is the app users will click to access Ternary. In the Okta Admin console:
- Add a Bookmark App from the App Catalog. More information here.
- Configure the app with:
- Application label: Ternary
- URL: https://my.ternary.app
- Leave all other options unchecked and select Done.
- On the app page, optionally set a logo.
Assign Both Chiclets to Users
Both the SAML app and the Bookmark app must be assigned to the same users. For each app:
- Go to the Assignments tab.
- Assign access to the appropriate users or groups. Group-based assignments are recommended for easier maintenance.
- Ensure every user assigned the bookmark app is also assigned the SAML app, and vice versa.
Validate the Integration
Once Ternary Customer Success confirms that the SSO integration is active:
- Assigned users will see a single Ternary chiclet in Okta.
- Clicking the chiclet opens the Ternary login page.
- Users should enter their Okta email address and not select Sign up.
- After clicking Next, authentication is handled by Okta without prompting for a password.
If configured correctly, the user will be redirected directly into your Ternary tenant.
Google Workspace SSO Configuration
With Ternary’s Google Workspace integration, organizations can achieve the following:
- Ensure all authorized users of the Ternary tenant authenticate using Google Workspace.
- Automatically provision new users in the tenant when they authenticate through Google Workspace.
- Define the default Ternary role assigned to users during auto provisioning.
Prerequisites
- A Google Workspace administrator with permission to create new SAML applications.
- A corporate email domain that matches the domain used to provision users in Google Workspace. At this time, only one email domain is supported per SSO integration, and only one SSO integration is supported per Ternary tenant.
- Coordination with a Ternary Customer Success Manager to obtain a Connection Name (for example,
yourcompanyname-saml). This connection name corresponds to configuration created internally by Ternary and will be referenced throughout the setup process.
Create Google Workspace SAML App
In the Google Workspace Admin console:
- Navigate to Web and mobile apps and select Add custom SAML app.
- Provide a name for the custom SAML app, along with an optional description and app icon, then select Continue.
- Select Option 1: Download IdP metadata and forward the downloaded metadata bundle to the Ternary Customer Success Manager. Select Continue.
- On the Service provider details page, enter the following values. The Customer Success Manager will have provided the required connection name. If a connection name has not been received, contact Customer Success before proceeding.
- ACS URL: https://auth.ternary.app/login/callback?connection=yourcompanyname-saml
- Entity ID:
urn:auth0:ternary:yourcompanyname-saml
- Accept the default values for the remaining fields and select Continue.
- On the Attributes page, configure the user attribute mappings that will be included in the SAML token sent to Ternary. Add the following Google Directory attributes by copying each value into the App attributes field:
- First name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/firstname
- Last name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/lastname
- Primary email: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
- Optionally, if Google Groups are used to control access or Scoped Views in Ternary, configure group mappings under Group membership (optional). Map the relevant Google groups to the following app attribute: http://schemas.xmlsoap.org/claims/group
- For example, a Google group named Ternary SSO Group may be mapped to the group attribute. Additional details on SSO-based Scoped View assignment are available in the related documentation. Select Finish when complete.
Enable User Access
To make the Google SSO application available:
- Select Expand User access.
- Assign the application to the appropriate users or groups. In this example, the Ternary SSO Group in Google Directory is granted access to the SAML SSO application.
- Select Save to complete the configuration. The application should now appear as ON for the organization.
Validate the Configuration
It is recommended to test the integration using the TEST SAML LOGIN option available in Google Workspace.
If the test does not succeed, open a Support case and include any technical details displayed at the bottom of the test results page.
A short video tutorial demonstrating the Google Workspace SSO configuration process is also available for reference.
Microsoft Entra ID SSO Configuration
With Ternary’s Microsoft Entra ID integration, organizations can achieve the following:
- Ensure all authorized users of the Ternary tenant authenticate using Microsoft Entra ID.
- Automatically provision new users in the tenant when they authenticate through Entra ID.
- Define the default Ternary role assigned to users during auto provisioning.
Prerequisites
- An Azure Entra ID administrator with permission to create and manage SAML applications.
- A corporate email domain that matches the domain used to provision users in the Entra ID directory. At this time, only one email domain is supported per SSO integration, and only one SSO integration is supported per Ternary tenant.
- Coordination with a Ternary Customer Success Manager to obtain a Connection Name (for example, yourcompanyname-saml). This connection name corresponds to configuration created internally by Ternary and will be referenced throughout the setup process.
Create the Azure Entra ID Enterprise Application
- In the Azure portal, navigate to Microsoft Entra ID, then select Enterprise Applications.
- Choose New Application.
- Select Create your own application.
- Provide a name for the Ternary SSO SAML application and complete the creation process.
Configure Single Sign-On
- After the enterprise application is created, select Set up single sign-on.
- Choose SAML as the single sign-on method.
- Edit the Basic SAML Configuration section and enter the Identifier (Entity ID) and Reply URL (Assertion Consumer Service URL) provided by Ternary Customer Success.
- Save and close the configuration.
Configure SAML Claims
Next, configure the required and additional SAML claims. While Ternary supports a validated set of Entra ID claims, organizations may have custom configurations depending on internal identity policies.
- Open the Attributes & Claims section.
- Review or create the following claims:
Required claim Name: nameidentifier Namespace: http://schemas.xmlsoap.org/ws/2005/05/identity/claims Name identifier format: Email address Source: Attribute Source attribute: user.mail
Additional claims
Name: emailaddress
Namespace: http://schemas.xmlsoap.org/ws/2005/05/identity/claims
Source:Attribute
Source attribute: user.mail
Name: givenname
Namespace: http://schemas.xmlsoap.org/ws/2005/05/identity/claims
Source:Attribute
Source attribute: user.givenname
Name: name
Namespace: http://schemas.xmlsoap.org/ws/2005/05/identity/claims
Source:Attribute
Source attribute: user.userprincipalname
Name: surname
Namespace: http://schemas.xmlsoap.org/ws/2005/05/identity/claims
Source:Attribute
Source attribute: user.surname
Configure Group Claims (Optional)
To assign Scoped Views through SSO, configure a group claim:
- Add a group claim following the guidance in the Scoped Views documentation.
- After saving, the group claim should appear as:
Claim Name: http://schemas.microsoft.com/ws/2008/06/identity/claims/groups Value: user.groups[Application Group]
Share Metadata with Ternary
In the SAML Certificates section of the enterprise application:
- Select Download the Federation Metadata XML.
- Provide the downloaded file to the Ternary Customer Success Manager.
Completion and Validation
At this point, the Microsoft Entra ID configuration is complete. Ternary Customer Success will coordinate validation and testing of the SAML integration to confirm successful authentication and provisioning behavior.
Updated 6 days ago