Single Sign On (SSO) is a key security feature of Marker.io. To keep your Marker.io account as secure as possible, check out our detailed guide:
Integrating Marker.io with your identity provider (IdP) makes logging in simple and secure for your team members. This allows IT administrators to better manage team access and keeps information more secure 🔐
We currently support most identity providers (Okta, OneLogin, Microsoft Entra ID, etc...) via both SAML 2.0 or Open ID Connect.
Requirements
SSO is available for customers on our Custom plans.
You must be an Admin of the Marker.io workspace to configure SSO.
Your Identity Provider (IdP) must support the SAML 2.0 standard or OpenID Connect (OIDC)
Enterprise feature
To enable SSO on your workspace, contact us today ->
How it works
Once you've enabled SSO on your workspace, your team members will be prompted to authenticate via your IdP based on their email, to access their Marker.io member account.
Alternatively, they can also log in via your identity provider's website.
Note: Only members with approved domains can access a workspace via SSO. Guests are not supported. Learn more about user roles in Marker.io here.
Login methods
By default, workspace members can log in via the following methods:
Email / Password
Email login code / Magic link
Google Sign On
Single Sign On (SSO) - via SAML or OIDC (if configured)
As an Enterprise customer, you restrict how members authenticate into your workspace for added security.
Exceptions
Admins can always log in through any method to prevent lockouts, regardless of the selected authentication method.
Guests will always be prompted to log in via other methods than SSO (Guests are not supported by SSO).
Members who are part of your workspace, but without an approved domain under your SSO settings, will be prompted to log in via other methods than SSO.
User Provisioning
Marker.io supports Just-in-Time provisioning when using SSO. This allows someone signing in via your IdP to join the workspace automatically as a member, so long as they have access to the Marker.io application through your IdP.
If you want to prevent users in your IdP from joining the workspace automatically, you can manage access in your IdP.
Marker.io currently does not support SCIM.
Domain Join Vs Just-In-Time (JIT) provisioning.
There are multiple ways to provision users to your Marker.io workspace. The "Domain Join" feature allows anyone who logs in to Marker.io with a listed domain, to join the workspace as a member, without necessarily being provisioned via your IdP.
To ensure that only users provisioned via your IdP can access your SSO-enabled workspace, we recommend removing all domains listed in the Domain join setting.
Configuration
Okta
Microsoft Entra ID
Step 1: Initiate SAML settings in Marker.io
Log in to your Marker.io account
Go to your Workspace Settings, under Authentication (you will need to be admin).
Under the Authentication Method section, select the SSO SAML option.
A new SSO Configuration section will appear.
Select SAML as an Authentication protocol
Add and verify one or more domains.
Copy your unique ACS URL. You will need it for your configuration in your IdP.
Go to your IdP provider.
Step 2: Create the Marker.io app in your IdP
Login into Microsoft Entra Admin Center
Under Applications > Enterprise Applications, click on the top menu + New application.
Once in the Gallery, click on +Create your own application.
Name the application "Marker.io" and select the radio button that mention (Non-gallery)
Once the Marker.io application is created, select Set up SSO > SAML.
Under Basic SAML Configuration, paste the following values in your application configuration:
Identifier (EntityID):
https://api.marker.io/auth/sso/saml
Reply URL (Assertion Consumer Service URL):
<the is the link from earlier step in the Marker.io interface>
Under Attributes and Claims, you need to set up the mapping as such. The “User Attributes & Claims” must be without namespace, and the capitalization is important
emailadress
-->user.mail
name
-->user.userprincipalname
firstName
-->user.givenname
lastName
-->user.surname
Unique User Identifier
-->user.mail
Under SAML Certificates, download the Federation Metadata XML file
In Marker.io Authentication page, in the SAML 2.0 Configuration section, upload the Metadata XML file.
Click Save & Enable SSO
Example of a complete, working SAML setup:
Step 3: Assign users
In your IdP, make sure to now assign users and groups to Marker.io. We recommend assigning everyone.
Custom Configuration via SAML 2.0
Step 1: Initiate SAML settings in Marker.io
Log in to your Marker.io account
Go to your Workspace Settings, under Authentication (you will need to be admin).
Under the Authentication Method section, select the SSO SAML option.
A new SSO Configuration section will appear.
Select SAML as an Authentication protocol
Add and verify one or more domains.
Copy your unique ACS URL. You will need it for your configuration in your IdP.
Go to your IdP provider.
Step 2: Create the Marker.io app in your IdP
Create a new Marker.io application in your IdP via SAML 2.0
Paste the following values in your application configuration
ACS / Single sign-on URL: <the is the link from earlier step in the Marker.io interface>
EntityID, add
https://api.marker.io/auth/sso/saml
Under Name ID, set it to
EmailAddress
Under Application Username set it to
EmailAddress
Configure the following user attributes and map them to the Okta values
email
-->user.email
firstName
-->user.firstName
lastName
-->user.lastName
Once setup, copy the Metadata Provider URL or XML file.
In Marker.io Authentication page, in the SAML 2.0 Configuration section, paste the Identity Provider Metadata URL or upload the Metadata XML file.
Click Save & Enable SSO
In your IdP, make sure to now assign users and groups to Marker.io. We recommend assigning everyone.
Custom Configuration via OpenID Connect (OIDC)
Step 1: Create the Marker.io app in your IdP
Create a new Marker.io application in your IdP via OpenID Connect
Paste the following values in your application configuration
Sign-in redirect URIs, add
https://api.marker.io/auth
/sso/oidc
Finalize app creation
Copy the following values from your newly created app
Issuer URL (eg: https://your-workspace.okta.com)
Client ID
Client Secret
In your IdP, make sure to now assign users and groups to Marker.io. We recommend assigning everyone.
Step 2: Configure OpenID Connect settings in Marker.io
Log in to your Marker.io account
Go to your Workspace Settings, under Authentication (you will need to be admin).
Under the Authentication Method section, select the SSO option.
A new SSO Configuration section will appear.
Select OpenID Connect as an Authentication protocol
Add and verify one or more domains.
Paste the following values from your IdP
Issuer URL (eg: https://your-workspace.okta.com)
Client ID
Client Secret
Click Save & Enable SSO
In your IdP, make sure to now assign users and groups to Marker.io. We recommend assigning everyone.
Troubleshooting
If you encounter errors when setting up SAML SSO, check to make sure your IdP's metadata, SAML requests and responses are valid XML against the SAML XSD schemas. You can do so using this online tool: https://www.samltool.com/validate_xml.php
Note that we do not support the EntitiesDescriptor
element. If your IdP's metadata contains this element, extract the contained EntityDescriptor
element and try again.
FAQs
How can I add new users?
How can I add new users?
Once SSO is enabled on your workspace, make sure that members are given access in your identity provider(IdP). New members will be automatically provisioned using Just-In-Time (JIT) provisioning and an account will be created for them so long as they have access through your IdP.
I get an error when logging in. Can you help?
I get an error when logging in. Can you help?
If SSO is enabled for your workspace and you can't log in, please try logging out of your Identity Provider (Okta, Entra ID, ..) and then logging in again. If you get repeated errors, please contact our support team.
Do you support user Provisioning? SCIM?
Do you support user Provisioning? SCIM?
We support Just-in-Time provisioning when using SSO. However, we don't currently support SCIM at the moment.
Can Guests log in with SSO?
Can Guests log in with SSO?
No. Currently, SSO is only supported for Members.
Why is it recommended to remove email domains from the “Domain join” setting before configuring SSO for my workspace?
Why is it recommended to remove email domains from the “Domain join” setting before configuring SSO for my workspace?
The “Domain Join” setting allows users with the selected domains to access your workspace without being provisioned via your IdP. To ensure that only users provisioned via your IdP can access your SAML-enabled workspace, disable this feature by removing all email addresses from the “Domain Join” list.
Can I still log in to Marker.io if my identity provider is out of service?
Can I still log in to Marker.io if my identity provider is out of service?
Yes, even with SSO enforced, Workspace admins have the option to log in with email.