Supported authentication methods
SensorZone supports multiple authentication paths. SSO is the enterprise option, but all methods are available depending on your organization’s needs.| Method | How it works | Best for |
|---|---|---|
| SAML 2.0 SSO | Federated login via your IdP (Okta, Azure AD, etc.) | Enterprise organizations with centralized identity management |
| OIDC SSO | OpenID Connect flow via your IdP | Organizations preferring OIDC over SAML |
| OAuth | Sign in with Google or Microsoft accounts | Teams using Google Workspace or Microsoft 365 without full SSO |
| Magic Link | Passwordless email link | Quick access without managing passwords |
| Email + Password | Traditional credentials | Individual users or organizations without an IdP |
Supported identity providers
SensorZone SSO works with any SAML 2.0 or OIDC-compliant identity provider. Tested providers include:Okta
Microsoft Azure AD
Google Workspace
OneLogin
Ping Identity
Other SAML/OIDC
How SSO works
Before diving into setup, here’s what happens when a user signs in via SSO: Key points:- SensorZone never sees the user’s IdP password
- Authentication is handled entirely by your identity provider
- Stytch acts as a bridge between SensorZone and your IdP
- Users are matched by email address and email domain
Prerequisites
Before starting the SSO setup, ensure you have:SensorZone admin access
IdP admin access
Setup guide: SAML 2.0
SAML is the most common enterprise SSO protocol. Follow these steps for any SAML-compatible IdP.Step 1: Get SensorZone’s SAML details
Contact your SensorZone account manager or support team to obtain:| Value | Description |
|---|---|
| ACS URL (Assertion Consumer Service) | The URL where your IdP sends the SAML response. Format: https://login.sensorzone.io/v1/b2b/sso/callback/{connection-id} |
| SP Entity ID | SensorZone’s identifier as a Service Provider. Same as the ACS URL |
| Connection ID | Your unique SAML connection identifier (provided by SensorZone) |
Step 2: Create a SAML application in your IdP
Okta
Okta
- In Okta Admin Console, go to Applications > Applications
- Click Create App Integration
- Select SAML 2.0, click Next
-
General Settings:
- App name:
SensorZone - App logo: (optional — download from your SensorZone settings)
- App name:
-
SAML Settings:
- Single sign-on URL: Paste the ACS URL from Step 1
- Audience URI (SP Entity ID): Paste the SP Entity ID from Step 1
- Name ID format:
EmailAddress - Application username:
Email
-
Attribute Statements (required):
Name Value emailuser.emailfirstNameuser.firstNamelastNameuser.lastName - Click Next, then Finish
- Go to the Sign On tab and copy the IdP metadata URL (or download the metadata XML)
- Go to the Assignments tab and assign users or groups who should have access
Microsoft Azure AD (Entra ID)
Microsoft Azure AD (Entra ID)
- In Azure Portal, go to Azure Active Directory > Enterprise applications
- Click New application > Create your own application
- Name:
SensorZone, select Integrate any other application you don’t find in the gallery - Go to Single sign-on > SAML
- Basic SAML Configuration:
- Identifier (Entity ID): Paste the SP Entity ID from Step 1
- Reply URL (ACS URL): Paste the ACS URL from Step 1
- Attributes & Claims:
email→user.mailfirstName→user.givennamelastName→user.surname
- Download the Federation Metadata XML from Section 3
- Assign users and groups under the Users and groups tab
Google Workspace
Google Workspace
- In Google Admin Console, go to Apps > Web and mobile apps
- Click Add app > Add custom SAML app
- Name:
SensorZone - Copy the SSO URL, Entity ID, and download the Certificate (you’ll need these for Step 3)
- Service Provider Details:
- ACS URL: Paste the ACS URL from Step 1
- Entity ID: Paste the SP Entity ID from Step 1
- Name ID format:
EMAIL - Name ID:
Basic Information > Primary email
- Attribute mapping:
email→Basic Information > Primary emailfirstName→Basic Information > First namelastName→Basic Information > Last name
- Click Finish
- Turn on the app for the relevant organizational units
OneLogin
OneLogin
- In OneLogin Admin, go to Applications > Add App
- Search for SAML Custom Connector (Advanced) and select it
- Name:
SensorZone - Under Configuration:
- ACS (Consumer) URL: Paste the ACS URL from Step 1
- SAML Audience: Paste the SP Entity ID from Step 1
- SAML nameID format:
Email
- Under Parameters, add:
email→EmailfirstName→First NamelastName→Last Name
- Under SSO, copy the Issuer URL and SAML 2.0 Endpoint (HTTP)
- Download the X.509 Certificate
- Save, then assign users under Access
Other SAML providers
Other SAML providers
- ACS URL / Reply URL: The ACS URL provided by SensorZone
- Entity ID / Audience: The SP Entity ID provided by SensorZone
- Name ID format:
EmailAddressoremail - Attribute statements: Map
email,firstName, andlastNameto your directory’s fields - Signing: Ensure both Response and Assertion are signed with
RSA_SHA256
- IdP Entity ID
- IdP SSO URL
- X.509 Certificate (PEM format)
Step 3: Send your IdP metadata to SensorZone
After creating the SAML app in your IdP, send the following to your SensorZone contact:- IdP Metadata URL (preferred) — or the metadata XML file
- IdP Entity ID
- IdP SSO URL
- X.509 Certificate (PEM format)
Step 4: Configure SSO in SensorZone
Once SensorZone has configured the Stytch connection, an admin can complete the setup:- Navigate to Settings > SSO in the SensorZone sidebar
- Toggle Enable SSO on
- Select your SSO Provider (Okta, Azure AD, Google Workspace, etc.)
- Enter your Email Domain (e.g.,
yourcompany.com) - Enter the SAML Connection ID provided by SensorZone support
- Optionally enable Auto-provision users (see User Provisioning below)
- Click Save
- Click Test Connection to verify the setup
Step 5: Test the connection
- Click Test Connection on the SSO settings page, or
- Open an incognito/private browser window
- Navigate to your SensorZone login page
- Click Sign in with SSO (or the SSO tab on the login page)
- You should be redirected to your IdP login page
- Authenticate with your corporate credentials
- You should be redirected back to SensorZone and logged in
Setup guide: OIDC
If your organization prefers OpenID Connect over SAML, SensorZone supports OIDC-based SSO as well.OIDC configuration
Create an OIDC application in your IdP
https://login.sensorzone.io/v1/b2b/sso/callback/{oidc-connection-id}).Collect OIDC credentials
- Client ID
- Client Secret
- Issuer URL (e.g.,
https://your-domain.okta.com/oauth2/default)
openid, profile, email.Send credentials to SensorZone
User provisioning
Manual provisioning
By default, users must be created in SensorZone before they can sign in via SSO. An admin invites users via the Users page, and the user completes setup. When they subsequently sign in via SSO, their existing account is matched by email address.Auto-provisioning
When Auto-provision users is enabled in SSO settings, SensorZone automatically creates a user account the first time someone authenticates via SSO. The user’s name and email are pulled from the IdP’s SAML assertion or OIDC profile. Auto-provisioned users are:- Assigned brand-level access by default
- Associated with your organization automatically
- Able to sign in immediately without an invitation
SCIM provisioning (advanced)
For organizations that need automated user lifecycle management, SensorZone supports SCIM 2.0 (System for Cross-domain Identity Management). SCIM enables:- Automatic user creation when assigned in your IdP
- Attribute synchronization when user details change
- Automatic deactivation when users are removed from the IdP
Request SCIM credentials
- SCIM Base URL:
https://api.stytch.com/v1/b2b/scim/{scim-connection-id} - SCIM Bearer Token: A secure token for authenticating SCIM requests
Configure SCIM in your IdP
- SCIM connector base URL: Enter the SCIM Base URL
- Authentication mode:
OAuth Bearer Token - Bearer token: Enter the SCIM Bearer Token
- Unique identifier:
userName - Enable: Create Users, Update User Attributes, Deactivate Users
Map attributes
| IdP Attribute | SCIM Attribute |
|---|---|
userName and emails[0].value | |
| First Name | name.givenName |
| Last Name | name.familyName |
| Phone | phoneNumbers[0].value |
| Active | active |
User login experience
Once SSO is configured, here’s what your users will see:Login page
The SensorZone login page offers three tabs:- Password — Email and password (default)
- Magic Link — Passwordless email link
- SSO / OAuth — Corporate SSO and social login (Google, Microsoft)
Step-up authentication
For added security, SensorZone may require step-up authentication (an email verification code) when:- The user hasn’t logged in for more than 14 days
- The login is from a new IP address
- The login is from a new device or browser
Linking additional accounts
Users can link multiple authentication methods to their account. From Settings > OAuth Accounts, users can:- Link their Google account
- Link their Microsoft account
- View and unlink existing connections
Admin SSO settings reference
The SSO settings page is available at Settings > SSO for administrators.| Field | Description | Required |
|---|---|---|
| Enable SSO | Master toggle to enable/disable SSO for your organization | Yes |
| SSO Provider | Your identity provider: Okta, Azure AD, Google Workspace, OneLogin, Ping Identity, or Other | Yes |
| Email Domain | The email domain for SSO users (e.g., yourcompany.com). Only users with this email domain can authenticate via SSO | Yes |
| SAML Connection ID | The Stytch SAML connection identifier (provided by SensorZone) | Yes (for SAML) |
| OIDC Connection ID | The Stytch OIDC connection identifier (provided by SensorZone) | Yes (for OIDC) |
| SCIM Connection ID | The Stytch SCIM connection identifier for automated provisioning | No |
| Auto-provision users | Automatically create SensorZone accounts for new SSO users | No |
Troubleshooting
SSO login redirects back to the login page without signing in
SSO login redirects back to the login page without signing in
- The Email Domain in SensorZone SSO settings matches your users’ email domain exactly
- Your IdP is sending the correct email attribute in the SAML assertion
- The user is assigned to the SensorZone application in your IdP
'Connection not found' error
'Connection not found' error
- The Connection ID in SensorZone settings matches the value provided by SensorZone support
- SSO is enabled (toggle is on)
- Contact SensorZone support to verify the connection is active
User is created but has no access to data
User is created but has no access to data
- Go to the Users page
- Find the new user
- Click Edit and assign the appropriate access level
SAML assertion is missing required attributes
SAML assertion is missing required attributes
email attribute. Verify your IdP sends:email→ user’s email addressfirstName→ user’s first name (optional but recommended)lastName→ user’s last name (optional but recommended)
SSO works for some users but not others
SSO works for some users but not others
- Go to the SensorZone application’s Assignments tab
- Verify the affected users (or their groups) are assigned
- Check that user accounts are active in the IdP
Certificate expiration warning
Certificate expiration warning
- Check if your IdP’s signing certificate has expired
- Generate a new certificate in your IdP
- Send the new certificate to SensorZone support for update
- Test the connection after the certificate is updated
SCIM provisioning is not syncing users
SCIM provisioning is not syncing users
- The SCIM Bearer Token hasn’t expired or been rotated
- The SCIM Base URL is correct
- Provisioning is enabled in your IdP (Create, Update, Deactivate are all toggled on)
- Test the connector configuration in your IdP’s provisioning settings
- Check your IdP’s provisioning logs for error details
Security considerations
Email domain validation
SensorZone validates that the email returned by your IdP matches your configured SSO domain. This prevents users from other organizations from gaining access to your data.No password storage
When SSO is active, SensorZone never stores or handles your users’ IdP passwords. Authentication is fully delegated to your identity provider.Organization isolation
Each brand in SensorZone has its own SSO configuration. Users authenticated via SSO are automatically scoped to their organization’s data.Certificate and token management
- SAML certificates should be rotated before expiration. Plan certificate renewals with your IdP administrator
- SCIM tokens should be treated as secrets and rotated periodically
- API tokens for tester devices are separate from SSO and managed independently
Audit trail
All SSO authentication events are logged, including:- Successful sign-ins
- Failed authentication attempts
- User provisioning events
- Domain validation failures
Frequently asked questions
Can I use SSO and password login at the same time?
Can I use SSO and password login at the same time?
What happens to existing users when SSO is enabled?
What happens to existing users when SSO is enabled?
Can multiple brands use different IdPs?
Can multiple brands use different IdPs?
How long does setup take?
How long does setup take?
- ~15 minutes to create the application in your IdP
- ~15 minutes for SensorZone support to configure the connection
- ~15 minutes for testing and verification
Do you support IdP-initiated SSO?
Do you support IdP-initiated SSO?
What if a user belongs to multiple organizations?
What if a user belongs to multiple organizations?
Is MFA supported through SSO?
Is MFA supported through SSO?

