SSO using SAML
Introduction
Unifize supports single sign-on (SSO) using the SAML, allowing organizations to integrate their existing identity providers (IdPs) such as Microsoft Entra ID (Azure Active Directory), Google Workspace, Okta, or other SAML-compliant systems.
SSO centralizes and secures user authentication, enabling IT teams to enforce identity policies while improving user experience and aligning with enterprise security and compliance standards.
Why SSO matters for security and compliance
Centralized authentication
SSO ensures all authentication flows are governed by your organization’s IdP. This gives IT teams control over:
Credential lifecycle and user provisioning
Password policy enforcement
Multi-factor authentication (MFA) requirements
Device and location-based access policies
Regulatory alignment
SSO contributes to organizational compliance with standards such as:
SOC 2
ISO 27001
HIPAA (where applicable)
It supports access control policies, traceable login activity, and identity governance—key components of secure process management.
Reduced risk exposure
Since SSO-managed users do not create or store passwords in Unifize, the risk of password-related attacks is eliminated. Authentication happens entirely through the trusted IdP, lowering the application’s security footprint.
Key capabilities
SAML 2.0 support
Integrates with any SAML-compliant IdP
Domain-based routing
Users are redirected to their IdP based on email domain configuration
MFA support
Multi-factor authentication is handled by the identity provider
OTP-based signature validation
SSO users approve digital signatures with one-time passcodes
Centralized session management
Sessions follow IdP-configured timeout and reauthentication policies
Authentication event logging
Login and OTP activities are logged and auditable in Unifize
Authentication flow
User navigates to the Unifize login page or opens the mobile app
They enter their work email address
If their domain is SSO-enabled, Unifize redirects them to the identity provider
The IdP authenticates the user (including MFA if configured)
After successful login, the user is redirected back to Unifize
For approval workflows, users are prompted to confirm their identity by entering a one-time passcode (OTP) sent to their email. This substitutes the need for a Unifize-managed password.
SSO configuration overview
SSO is configured by Unifize administrators from Org Settings → SSO. Required fields include:
Entity ID (from the IdP)
SSO URL (IdP login endpoint)
X.509 certificate
Unifize provides the following for your IdP setup:
Service provider Entity ID
Authorization callback URL
Org SSO URL
For Azure AD (Microsoft Entra ID), Okta, and Google Workspace, setup requires mapping these values within the enterprise application’s SAML configuration.
Compliance considerations
Access control
Identity provider controls access centrally
Password policy management
Handled by IdP; Unifize does not store SSO passwords
Deprovisioning and revocation
Disable user access in the IdP to remove Unifize access immediately
Audit trail
Unifize logs all login and OTP-based approval actions
Signature compliance
OTP-based authentication ensures signature traceability
Last updated