Skip to main content

SSO Setup Guide

T
Written by Tom Aristone
Updated today

UE Advocacy supports self-service SSO setup that your IT team completes entirely inside your own IdP. No configuration is needed inside UE Advocacy itself.

To get started, request your SSO ticket(s) from your UE Advocacy CSM when you're ready to set up SSO.


What you'll receive

You will be issued up to two tickets depending on your setup:

  • Admin SSO ticket β€” always included. Controls SSO access to the UE Advocacy admin interface for your internal team.

  • Advocate / Hub SSO ticket β€” optional. Only needed if you are using the UE Advocacy Community Hub module. Controls SSO access to your advocate-facing hub.

Each ticket contains its own login URL and configuration values and must be set up separately in your IdP.

Note: SSO links generated from tickets expire after 5 days. Request them when your IT team is ready to complete setup.


Supported identity providers

UE Advocacy supports all major IdPs via OIDC or SAML 2.0, including Okta, Azure AD / Entra ID, Google Workspace, Auth0, Ping Identity, and Keycloak.


What's inside each ticket

Each ticket includes everything your IT team needs to complete setup:

  • Login URL (Admin or Hub)

  • Redirect URI / ACS URL

  • Required attribute mappings

  • UE Advocacy application identifiers

  • IdP-initiated URL (if you want to add a tile in Okta, Azure, Google, etc.)


Required attributes

  • email (must be unique; lowercase recommended)

  • sub (OIDC) or NameID (SAML)

  • given_name and family_name (optional)


Login flows

SP-initiated (default): User visits the Admin or Hub login URL, selects SSO, and is redirected to your IdP for authentication.

IdP-initiated (optional): You can add UE Advocacy as a tile in Okta, Azure, Google, Ping, etc. Each ticket includes the correct IdP-initiated URL for this.


Setup steps

  1. Request your Admin SSO ticket from your CSM. Request the Hub SSO ticket as well if you are using the Community Hub.

  2. Your IT team opens each ticket and completes setup inside your IdP.

  3. Your IdP validates the configuration.

  4. SSO goes live automatically once validation succeeds.

  5. Test with a small group of users before rolling out broadly.


Troubleshooting

User can't log in after setup: Make sure the user or their group is assigned to the UE Advocacy app in your IdP.

Email domain mismatch error: The email domain must match the domain registered in your ticket.

IdP-initiated login not working: Double-check that the IdP-initiated URL from the ticket was copied exactly β€” this is the most common cause.


Questions? Contact your UE Advocacy CSM or email [email protected]

Did this answer your question?