Setting Up SAML/SSO
Step 1: Download the PixieBrix SAML Metadata File
Step 2: Configure your Identity Provider (IdP)
Step 2a: Create a SAML Application
2b: Configure Attribute Mapping
Service Provider Attribute Name
Service Provider Attribute Description
Okta
Service Provider Attribute Name
IdP Attribute Name
Azure AD / Microsoft Entra
Service Provider Attribute Name
IdP Attribute Name
Google Workspace
Service Provider Attribute Name
IdP Attribute Name
JumpCloud
Service Provider Attribute Name
IdP Attribute Name
2c: Assign Users to the SAML Application
Step 3: Send Identity Provider Configuration to the PixieBrix Support Team
Step 4: Test the SAML/SSO Connection
Recommended: Configure the PixieBrix Browser Extension Policy
Troubleshooting
Users receive a error for the IdP: "Your administrator has configured the application PixieBrix to block users unless they are specifically granted ("assigned") access to the application"
Users receive a server error from PixieBrix after logging into the Identity Provider
Last updated
Was this helpful?