Suped

SAML SSO

Enable SAML-based single sign-on for your Suped organization.

Suped supports SAML-based single sign-on (SSO) for enterprise organizations. SAML allows your team to log in using your existing identity provider, such as Microsoft Entra, Okta, or Google Workspace.

How it works

  • SSO is configured per-organization with a specific email domain.
  • Users with a matching email domain are required to log in via your identity provider.
  • On first login, users with the configured domain are auto-provisioned. No manual invitation required.

Setting up SAML SSO

  1. Go to Settings > SAML SSO.
  2. Click Download metadata.xml and upload this file to your identity provider when configuring the SAML application.
  3. Enter your email domain (e.g. example.com). Users with this email domain will be required to log in via SAML.
  4. Enter your IdP metadata URL. This is the federation metadata XML URL from your identity provider.
  5. Verify domain ownership by adding a DNS TXT record at _suped-verify.yourdomain.com with the value shown on the page. You can remove this record after saving successfully.
  6. Click Save. Suped will fetch your metadata and verify domain ownership.

After setup

Once SAML is enabled, anyone logging in with an email address matching your configured domain will be redirected to your identity provider. New users are automatically provisioned on their first login.

Disabling SAML SSO

To disable SAML, go to Settings > SAML SSO and click Disable SAML SSO. Users will need to log in with email and password after disabling.