Centralized authentication
Users sign in with their corporate credentials
JIT provisioning
New users are automatically added to your workspace on first SSO sign-in
Profile sync
Name and profile picture are synced from your IdP on each login
Role mapping
Automatically assign Yasu roles based on IdP group membership
Prerequisites
Before configuring SSO, ensure you have:- A Yasu workspace with a subscription plan that includes SSO
- Admin or Owner access to the Yasu workspace
- Admin access to your identity provider (Okta, Azure AD, Google Workspace, etc.)
Generic Setup (Any SAML 2.0 Provider)
This guide works with any SAML 2.0 compatible identity provider.Gather SAML configuration values from Yasu
- Sign in to Yasu and navigate to your workspace
- Go to Integrations → SSO Configuration
- Copy the three SAML configuration values displayed on the page:
- Entity ID / Issuer — The unique identifier for Yasu as a service provider
- ACS URL (Assertion Consumer Service) — Where your IdP sends the SAML response after authentication
- NameID Format —
urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
Create a SAML application in your IdP
- In your identity provider’s admin console, create a new SAML 2.0 application
- Configure the following settings:
- ACS URL / Reply URL / Single Sign-On URL → paste the ACS URL from Step 1
- Entity ID / Audience URI / Identifier → paste the Entity ID from Step 1
- NameID Format → set to
emailAddress
- Configure attribute statements to send:
email— the user’s email address (required)nameordisplayName— the user’s full name (recommended)groupsormemberOf— group memberships (optional, for role mapping)
Download IdP metadata XML
After saving the SAML application configuration in your IdP, download the IdP Metadata XML file. This XML file contains your IdP’s certificate, SSO endpoint, and entity ID.
Configure SSO in Yasu
- On the SSO Configuration page, click Configure SSO
- In the setup dialog:
- Identity Provider — Select your IdP from the dropdown (Okta, Microsoft Entra ID, Google Workspace, OneLogin, or Custom)
- Company Domain — Enter the email domain for SSO authentication (e.g.,
company.com). Users with this email domain will be redirected to your IdP. - SAML Metadata XML — Upload the XML file or paste the metadata content directly
- The metadata is validated automatically — look for the green “Metadata Valid” indicator with the detected Entity ID
- Click Add Domain to save
Configure attribute mapping (optional)
Expand the configured provider to access attribute mapping settings:
- Name attribute — The SAML attribute name that contains the user’s display name (e.g.,
displayName,name) - Picture attribute — The SAML attribute name that contains the user’s avatar URL (e.g.,
photoUrl,picture) - Groups/role attribute — The SAML attribute name that contains group memberships (e.g.,
groups,memberOf) - Click Save Attribute Mapping
Configure role mapping (optional)
Role mapping lets you automatically assign Yasu roles based on IdP group values:
- In the Role Mapping section of the expanded provider
- Enter the IdP group value — the exact group name as sent by your IdP (e.g.,
Engineering,Admins) - Select the Yasu role — either Member or Owner
- Click Add
- Repeat for additional group-to-role mappings
Provider-Specific Guides
Follow the step-by-step guide for your identity provider:Microsoft Entra ID
Configure SSO with Azure AD / Entra ID
Google Workspace
Configure SSO with Google Workspace
Okta
Configure SSO with Okta
OneLogin
Configure SSO with OneLogin
Role Mapping
Role mapping allows you to automatically assign Yasu workspace roles based on group memberships from your identity provider.How it works
- When a user signs in via SSO, Yasu reads the groups attribute from the SAML assertion
- The attribute name is configurable (default:
groups,memberOf, etc.) via attribute mapping - Yasu checks the group value against your configured role mappings
- If a match is found, the user’s role is updated accordingly
Setting up role mapping
- Navigate to Integrations → SSO Configuration
- Expand the configured SSO provider
- First, ensure the Groups/role attribute is set correctly in the Attribute Mapping section
- In the Role Mapping section:
- Enter the IdP group value exactly as your IdP sends it (case-sensitive)
- Select the Yasu role (Member or Owner)
- Click Add
Example mappings
| IdP group value | Yasu role | Description |
|---|---|---|
Engineering | Member | All engineers get member access |
Platform-Admins | Owner | Platform admins get owner access |
FinOps-Team | Owner | FinOps team leads get owner access |
Just-In-Time (JIT) Provisioning
JIT provisioning automatically adds new users to your Yasu workspace when they first sign in via SSO.How it works
- A user with an email matching your SSO domain signs in through your identity provider
- After successful authentication, Yasu checks if the user already has a membership in your workspace
- If not, Yasu automatically:
- Creates a membership with the Member role (unless role mapping assigns a different role)
- Syncs the user’s profile (name, picture) from the IdP
- Redirects the user to the workspace
What admins need to know:
- No manual invitations needed — Any user who authenticates through your IdP is automatically provisioned
- Control access at the IdP — To prevent someone from accessing Yasu, remove them from the SAML application in your IdP
- Existing users are linked — If a user already signed up with Google OAuth or email/password and then signs in via SSO, their accounts are automatically merged
- Billing impact — JIT provisioning may increase your seat count if you’re on a per-seat plan
Troubleshooting
"Invalid SAML metadata" error
"Invalid SAML metadata" error
Cause: The uploaded/pasted content is not valid SAML metadata XML.Solution:
- Ensure you downloaded the IdP Metadata XML (not a certificate or other file)
- Open the XML file in a text editor and verify it starts with
<?xmland contains an<EntityDescriptor>element - For Azure: download the Federation Metadata XML, not the certificate
- For Okta: use View IdP metadata from the Sign On tab
- For Google: download metadata from step 2 of the SAML app wizard
SSO login redirects but user cannot access workspace
SSO login redirects but user cannot access workspace
Cause: The user’s email domain doesn’t match the configured SSO domain, or JIT provisioning failed.Solution:
- Verify the Company Domain in Yasu matches the user’s email domain exactly
- Check that the user is assigned to the SAML application in your IdP
- Ensure the SAML assertion includes a valid email in the NameID
User roles are not being synced
User roles are not being synced
Cause: Attribute mapping or role mapping is misconfigured.Solution:
- Verify the Groups/role attribute name in Attribute Mapping matches what your IdP actually sends
- Check that the IdP group value in Role Mapping exactly matches the group name (case-sensitive)
- In your IdP, verify that group claims are included in the SAML assertion
- For Azure: ensure you added a group claim under User Attributes & Claims
- For Okta: ensure you configured Group Attribute Statements
- For Google: ensure you added group membership mapping
"Domain already has an SSO provider" error
"Domain already has an SSO provider" error
Cause: A provider for this domain is already configured.Solution: Delete the existing provider first, then reconfigure. Note that deleting a provider will revoke access for SSO-only users.
Users lose access after deleting an SSO provider
Users lose access after deleting an SSO provider
Expected behavior. When an SSO provider is deleted:
- Users who only authenticated via SSO are removed from the workspace
- Users who also have other sign-in methods (email/password, Google OAuth) retain access
- The primary account owner is never removed
Profile name/picture not updating from IdP
Profile name/picture not updating from IdP
Cause: Attribute mapping may not match your IdP’s attribute names.Solution:
- Check the Name attribute and Picture attribute in Attribute Mapping
- Common attribute names by provider:
- Okta:
displayName,profileUrl - Azure:
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name - Google:
name,picture - OneLogin:
User.DisplayName
- Okta:
SSO sign-in fails with a SAML error
SSO sign-in fails with a SAML error
Cause: Misconfigured ACS URL or Entity ID in your IdP.Solution:
- Double-check that the ACS URL and Entity ID in your IdP exactly match the values shown on Yasu’s SSO page
- Ensure the SAML application is active/enabled in your IdP
- Check that the signing certificate has not expired