Enterprise Setup
Configure SAML SSO and SCIM provisioning for your enterprise.
SSO requires a Business plan or higher. SCIM provisioning requires an Enterprise plan. View plans
Prerequisites
- Business plan (for SSO) or Enterprise plan (for SCIM)
- Admin role in your organization
- Access to your identity provider admin console
Part 1: SAML SSO Configuration
Get Penvio SAML Details
- Go to Organization → Security → SAML SSO
- Note these values:
- Entity ID (SP)
- ACS URL
- Logout URL
Configure Your IdP
The steps vary by provider. Here’s a general guide:
In Okta:
- Admin Console → Applications → Create App Integration
- Select SAML 2.0
- Enter app name: “Penvio”
- Enter SSO URL (ACS URL from Penvio)
- Enter Audience URI (Entity ID from Penvio)
- Configure attribute statements:
- email → user.email
- firstName → user.firstName
- lastName → user.lastName
- Save and get IdP metadata
In Azure AD:
- Enterprise Applications → New Application
- Create your own application
- Set up single sign-on → SAML
- Enter Entity ID and Reply URL
- Add attributes for email, name
- Download Federation Metadata XML
Configure Penvio
- Return to Penvio SAML settings
- Click Upload Metadata
- Upload the XML file from your IdP
- Click Save
Test SSO
- Click Test Connection
- You’ll be redirected to your IdP
- Sign in with an IdP account
- Should return successfully
Enable SSO
- Choose enforcement:
- Optional: Users can use SSO or password
- Required: All users must use SSO
- Click Enable
Part 2: SCIM Provisioning (Enterprise)
Enable SCIM
- Go to Organization → Security → SCIM
- Click Enable SCIM
Get SCIM Credentials
- Click Generate Token
- Copy the token (shown once)
- Note the SCIM base URL
Configure Your IdP
In Okta:
- Go to your Penvio app in Okta
- Provisioning tab → Configure API Integration
- Enable API Integration
- Enter SCIM base URL
- Enter Bearer token
- Test API Credentials
Enable provisioning features:
- Create Users
- Update User Attributes
- Deactivate Users
In Azure AD:
- Go to your Penvio enterprise app
- Provisioning → Get started
- Select Automatic
- Enter Tenant URL (SCIM base URL)
- Enter Secret Token (SCIM token)
- Test Connection
- Configure mappings
- Turn Provisioning Status: On
Configure Attribute Mapping
Ensure these are mapped:
| IdP Attribute | Penvio |
|---|---|
| userName | |
| givenName | name.givenName |
| surname | name.familyName |
| displayName | displayName |
Assign Users
- In your IdP, assign users/groups to the Penvio app
- Users are provisioned automatically
- Check Penvio Members list to confirm
Part 3: Testing
Test SSO Login
- Sign out of Penvio
- Go to penvio.io/login
- Click Sign in with SSO
- Enter your organization slug
- Complete IdP login
- Should land in Penvio
Test Provisioning
- Assign a new user in IdP
- Wait for sync (usually 20-40 min)
- Check Penvio Members list
- New user should appear
Troubleshooting
SSO Login Fails
- Check certificate expiration
- Verify attribute mapping
- Review IdP logs
Users Not Provisioned
- Check SCIM token validity
- Verify attribute mapping
- Review IdP provisioning logs
What You Learned
- Configure SAML SSO
- Set up SCIM provisioning
- Connect with identity providers
- Test enterprise integrations
Next Steps
- SAML SSO Guide - Detailed SSO docs
- SCIM Guide - Detailed SCIM docs
- Storage Configuration - Configure BYOB storage
- Audit Logs - Monitor SSO activity
Last updated on