Single sign-on (SSO) is a great way to mitigate site access risks and reduce password fatigue from different username and password combinations. At iAuditor, we support any authentication solution that utilizes the Security Assertion Markup Language (SAML) 2.0 standard, including some of the most common SSO solutions, such as Active Directory (ADFS, Azure), PingFederate, Google, and Okta.

This article shows you how to set up single sign-on (SSO) functionality for your iAuditor organization, once we have configured SSO from our end.

Before you begin

Please note that SSO is only available for organizations on our Premium or Enterprise subscriptions. If you are interested in setting up SSO for your organization, you can contact our customer success team to get started.

Once we have SSO configured from our end, you can follow the relevant instructions in this article to finalize the configuration on your company domain.

Configure Generic SAML

iAuditor uses Auth0 as the SSO broker, which requires the following settings.

  • Assertion-consumer Service URL (Application Callback URL): https://safetyculture.au.auth0.com/login/callback?connection={name_provided_by_iAuditor}
  • Entity ID (Audience): urn:auth0:safetyculture:{name_provided_by_iAuditor}
  • Single Log Out URL: Not yet supported.

If the Identity Provider offers a choice for bindings, you should select “HTTP-Redirect” for the authentication request.

Active Directory Federation Services (ADFS)

Active Directory Federation Services (ADFS) is a commonly used SSO solution that’s created by Microsoft. ADFS manages authentication through a proxy service, hosted between a company's Active Directory and iAuditor. You can set up ADFS SSO via one of the following options.

  • Service Provider (SP)-initiated SSO: A user first visits the iAuditor login page to be redirected to the company portal. The user then enters the company credentials to log in to iAuditor. If the user is already logged in, no further steps are required.
  • Identify Provider (IdP)-initiated SSO: A user first logs in to the company portal for the option to open iAuditor without having to log in again.

ADFS Web Services Federation

Follow the instructions to connect iAuditor as an app to ADFS and apply the following settings where required.

  • Realm Identifier: urn:auth0:safetyculture
  • Relying Party Trust identifier: urn:auth0:safetyculture
  • Endpoint: https://safetyculture.au.auth0.com/login/callback

Keep in mind that to finalize the SSO, you need to send the Federation Metadata endpoint or standalone file to your contact at iAuditor for configuration.

ADFS SAML WebSSO

Follow the instructions to add iAuditor as a relying party and apply the following settings where required.

  • Display Nameurn:auth0:safetyculture.au.auth0.com
  • Relying party trust identifier: urn:auth0:safetyculture.au.auth0.com
  • Post-back URL: https://safetyculture.au.auth0.com/login/callback?connection={name_provided_by_iAuditor}
  • Entity IDurn:auth0:safetyculture:{name_provided_by_iAuditor}

The SSO connection name will be provided by iAuditor after the connection is configured.

Was this article helpful?

We love your feedback. Please tell us what you think.


Yes No
Care to share a bit more so we can continue to make improvements for you? Care to share a bit more so we can make this article even better for you? Thanks for your feedback!