Skip to main content
Skip table of contents

Enterprise Single-Sign-On (SSO)

Description

Enterprise SSO makes it possible for users to log in to Piano Analytics via their organization's own ID Platform (IdP). A major benefit of using Enterprise SSO is secure access to the Piano Analytics only for verified users from your IdP platform.

We support the simplified connectors for the following IdPs:

  • Microsoft Azure AD

  • Google Workspace

  • Okta Workforce

We also support the following protocols:

  • OpenID generic (OIDC) - to be preferred

  • SAML 2.0

Please reach out to our Piano Account representative for more information about pricing for this solution. 

Good to know

SSO will be activated on all the email domain names you'll provide for activation. Any user with an email using these domains will be SSO users de facto.

Below is a list of the information you'll to provide for SSO activation, depending on your IdP. Feel free to contact our support team if you need help.

Microsoft Azure AD configuration

You must first register an application on Azure AD with the following information:

Once done, you will need to provide the following information to our support team:

  • Azure AD domain name

  • Azure AD Tenant ID

  • Application's Client ID

  • Application's Client secret value

  • Type of tenant (single, multiple tenants,...)

  • Optional list of secondary email domains for which SSO will be enabled

You will find more information on how to configure Microsoft Azure AD here.

Google Workspace configuration

You will need create and configure your Google application with the following information

Once done, you will need to provide the following information to our support team:

  • The application Client ID

  • The application Client Secret

  • Google Workspace Domain for which SSO will be enabled

  • Optional list of secondary email domains for which SSO will be enabled

You will find more information on how to configure Google Workspace here.

OpenID generic (OIDC) configuration

You will need create and configure your application with the following information:

Once done, you will need to provide the following information to our support team:

  • The application Client ID

  • The application Client Secret

  • Well-known URL

  • List of email domains for which SSO will be enabled

You will find more information on how to configure your OpenID here.

Okta Workforce configuration

You will first need to create an application on your Okta tenant. Your application must be created and configured with the following information:

Once done, you will need to provide the following information to our support team:

  • Okta Domain (domain-name.okta.com or custom domain)

  • The application Client ID

  • The application Client Secret

  • List of email domains for which SSO will be enabled

You will find more information on how to configure Okta Workforce here.

SAML 2.0 configuration

Please provide the metadata URL of your IDP, including this mandatory information:

  • SAML login URL use for start the exchange between SP and IDP

  • X.509 certificate used for sign the exchanges from the IDP

You will also need to provide the list of the domain names you'd like to use with SSO.

About Client Secret

You are responsible for the validity of your Client Secret Key and its renewal in case of expiration.

Please contact us at least one month in advance before expiration, or if you plan to make any changes so we can reflect them on your Piano Analytics configuration.

Login

Clients with Enterprise SSO will use one of the below URLs to log in to the respective Piano Product.

Once the Enterprise SSO is activated, a user that is already logged in to your IdP will be automatically redirected on the appropriate URL (see above).

If a user is not already logged in to your IdP, they will be redirected to the IdP login.

API Keys

Since SSO users do not have a password, they need to rely on API Keys to authenticate to external API calls.
Find out more on API Keys.

Emails

The email sender address for user emails, such as registration and password reset, will be updated based on the IdP provider that has been implemented.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.