Single sign-on for your entire team
SAML 2.0 SSO with Okta, Azure AD, OneLogin, and any standards-compliant identity provider. Set up in minutes, not days.
How SSO works with Xplorr
Admin configures IdP metadata URL
Paste your identity provider's SAML metadata URL into Xplorr. We auto-parse the SSO URL, certificate, and entity ID.
Xplorr returns SP metadata
Copy the Xplorr service provider metadata (ACS URL, entity ID, certificate) back into your IdP to complete the trust relationship.
User types email, SSO auto-detected
When a user enters their corporate email, Xplorr detects the domain is SSO-enabled and shows the "Continue with SSO" button.
Redirect, authenticate, land on dashboard
The user is redirected to your corporate IdP, authenticates with existing credentials, and lands on their Xplorr dashboard.
SSO that works the way you expect
- Auto-provisioning — new users get an account on first SSO login
- Configurable default role for auto-provisioned users
- Email domain detection for automatic SSO routing
- Mandatory SSO enforcement — disable password login org-wide
- Password fallback for designated break-glass admins
- Multiple SSO configurations per organization
Sign in to Xplorr
Email address
Supported identity providers
Works with every major identity provider out of the box.
Okta
Full SAML 2.0 integration with auto-provisioning
Azure AD
Enterprise application with SCIM support
OneLogin
SAML connector with role mapping
Auth0
SAML connection with custom claims
Google Workspace
SAML app with domain-wide delegation
PingFederate
SP-initiated SSO with signed assertions
Any SAML 2.0 IdP
Generic SAML 2.0 metadata URL or manual configuration
How SSO is secured
- SAML assertion signature validation on every login
- Replay prevention with one-time assertion IDs and timestamps
- Encrypted SAML assertions supported (AES-256)
- All SSO events logged in the organization audit trail
- Session tokens issued after SAML validation with short TTL
- IdP-initiated and SP-initiated flows both supported
Set up SSO in 5 minutes
Paste your IdP metadata URL, copy the SP metadata back, and your team is signing in with corporate credentials.
Get started free