This article is also available in:

Setting up integrations in Drimify (Webhooks & Mailers)

๐Ÿ” Enterprise SSO โ€“ Complete Configuration Guide


Enterprise Single Sign-On (SSO) allows your organization to authenticate users into the Drimify platform using your existing Identity Provider (IdP). This is distinct from any SSO or authentication mechanisms used within games or experiences created on Drimify.


Users with your company domain can securely log in to the Drimify platform without creating separate passwords, and will automatically be assigned to the correct workspace.


Note: This guide covers platform access SSO only. If you are looking to configure authentication within a game or experience (e.g. gating game content behind a login), that is handled separately at the experience level.



This guide covers:


  1. Available SSO protocols
  2. OAuth 2.0 configuration
  3. SAML 2.0 configuration
  4. Default workspace assignment
  5. Domain verification (DNS)
  6. How platform login works



๐Ÿš€ Available SSO Protocols


You can configure Enterprise SSO for platform login using one of the following protocols:


1๏ธโƒฃ OAuth 2.0 (OpenID Connect)


Recommended for modern Identity Providers. Used by:


  • Google
  • Microsoft Entra ID
  • Okta
  • Custom OIDC providers


OAuth 2.0 relies on authorization flows and user info endpoints to retrieve user identity securely.


2๏ธโƒฃ SAML 2.0


Widely used in enterprise environments. SAML uses XML-based authentication assertions exchanged between your Identity Provider and Drimify.


Choose the protocol supported by your Identity Provider.



โš™๏ธ Creating a New SSO Configuration


Go to: Admin โ†’ Enterprise SSO โ†’ New Configuration


You will need to define:


  • Configuration Name
  • Email Domain
  • SSO Protocol (OAuth 2.0 or SAML 2.0)


Once saved, domain verification will be required before enabling the SSO for platform login.



๐ŸŒ Email Domain


Enter the domain associated with your organisation. Example: company.com


Users logging in to the Drimify platform with @company.com will automatically be redirected to your SSO provider.


Only one SSO configuration can be active per domain.



๐ŸŸฃ OAuth 2.0 Configuration


Select OAuth 2.0 as the SSO protocol. You must create an OAuth / OpenID Connect application in your Identity Provider first.


๐Ÿ” Redirect URI (Required in your IdP)


When creating the OAuth application, configure this Redirect URI:

https://my.drimify.com/en/sso/callback/oauth


This URI must match exactly in your IdP configuration.


๐Ÿ”‘ Client Credentials


  • Client ID โ€” Public identifier provided by your Identity Provider.
  • Client Secret โ€” Private key associated with your OAuth application. Keep it secure.


๐ŸŒ OAuth Endpoints


Endpoint

Description

Example

Authorisation URL

Where users are redirected to log in

https://example.com/oauth/connect

Access Token URL

Exchanges the auth code for an access token

https://example.com/oauth/token

Resource Owner URL

Returns user identity after authentication

https://example.com/oauth/userinfo


๐ŸŽฏ Scopes


Enter scopes as a comma-separated list. For standard OpenID Connect:

openid, profile, email


These allow access to: unique user ID, email address, first name, last name.


๐Ÿ‘ค Attribute Mapping


Your Identity Provider returns user data in JSON format. Define which fields map to required values:


Field

Example value

ID Field

sub

Email Field

email

First Name Field

given_name

Last Name Field

family_name


These field names must match exactly what your Identity Provider returns.



๐Ÿ”ต SAML 2.0 Configuration


Select SAML 2.0 as the protocol. You will need the following values from your Identity Provider:


  • Identity Provider Entity ID (Issuer URL) โ€” Unique identifier of your IdP.
  • Single Sign-On Service URL โ€” The endpoint where authentication requests are sent.
  • Single Logout Service URL (Optional) โ€” Endpoint used for single logout.
  • X509 Certificate โ€” Public certificate used to validate SAML assertions.
  • Encryption X509 Certificate (Optional) โ€” Used if your provider requires encrypted assertions.
  • Requested Authentication Context (Optional) โ€” Defines required authentication strength (e.g. MFA). Leave disabled unless required.


๐Ÿข Service Provider Information


After saving your SAML configuration, Drimify will generate values required by your Identity Provider:


  • Service Provider Entity ID (Metadata URL)
  • Assertion Consumer Service (ACS URL)
  • Single Logout Service (SLS URL)


These must be added to your Identity Provider configuration.



๐Ÿข Default Workspace Settings


Enterprise SSO allows automatic workspace assignment for all users logging in to the platform via SSO. You must define:


  • Workspace โ€” All users authenticating via this SSO will automatically join this workspace.
  • Default Department โ€” Users will be assigned to this department.
  • Predefined Role โ€” Defines the default permissions granted to new users on first platform login via SSO.


This ensures proper access control from the very first platform login.



๐ŸŒ Domain Verification (DNS Required)


After saving your SSO configuration, domain verification is mandatory before SSO can be activated for platform login.


To verify ownership:


  1. A DNS TXT record will be generated.
  2. Add the TXT record to your domain's DNS settings.
  3. Click "Verify Domain" inside the platform.


Example record:

Type: TXT

Host: company.com

Value: drimify-domain-verification=xxxxxxxxxxxxxxxx


DNS propagation may take up to 48 hours. SSO cannot be enabled until verification is successful.



๐Ÿ” How Platform Login Works


  1. User navigates to the Drimify platform and enters their email address.
  2. If the domain matches a configured SSO, they are automatically redirected to your Identity Provider.
  3. After successful authentication, they are redirected back to Drimify.
  4. If new, their platform account is created automatically and assigned to the configured workspace and role.



๐Ÿงช Testing Your SSO


Before enabling for all users:


  • Test with a user from your domain
  • Confirm email mapping works correctly
  • Verify first and last names populate properly
  • Test logout behaviour
  • Ensure the redirect URI matches exactly



โ— Common Issues


SSO response did not include an email address

โ†’ Ensure the email scope is included (OAuth) or the email attribute is mapped (SAML).


Invalid redirect URI

โ†’ Confirm it matches exactly: https://my.drimify.com/en/sso/callback/oauth


Domain not verified

โ†’ Ensure the DNS TXT record is correctly added and fully propagated.



๐Ÿ” Security Recommendations


  • Never expose your Client Secret.
  • Use HTTPS-only endpoints.
  • Restrict your IdP application to your organisation.
  • Regularly rotate credentials where possible.



Your Enterprise SSO for platform login is fully operational once the configuration is saved, the domain is verified, and SSO is enabled.




Updated on: 06/05/2026

Was this article helpful?

Share your feedback

Cancel

Thank you!