Single Sign-On

Prev Next

Once you have registered & verified your email domains you can setup Single Sign-On (SSO) using the OIDC / SAML 2.0 standards facilitating secure access to applications and services.

This ensures streamlined authentication processes while maintaining compatibility and consistency within your organization's identity management infrastructure.

Administrators can effortlessly manage user attributes such as email, given name, and surname claims. However, please note that custom claims are not currently supported.

Add MyDomain

On the Single Sign-On - MyDomain section, you need to specify your unique MyDomain with Visma. This is used to host your company's SAML endpoints and sign in page with Visma. For instance if your company name is Example, you might want to select example as your MyDomain. Then your MyDomain will become available at https://example.my.connect.visma.com.        

MyDomain can only contain lowercase letters, numbers, dashes (-), but can't start or end with a dash. The maximum length is 40 characters.

Click Add and continue to use the desired MyDomain        

AuthSettings_SSO_AddMydomain

Choose the type of SSO integration (SAML2 or OIDC)

On the  Single Sign-On - Identity provider section,  you can choose the type of SSO you  wish to setup for your External Identity Provider. Available choices are Add OIDC Identity Provider  or  Add SAML2 Identity Provider.

AuthSettings_SSO_ChooseType.png

Add SAML2 Identity Provider

If you click Add SAML2 Identity Provider, this list will open for you to choose between Azure AD, ADFS, Google Workspace, Others and follow the instructions for your specific provider.  

AuthSettings_SSO_ChooseIdentityProvider

List of SAML2 Identity Providers:

Add OIDC Identity Provider

If you click Add OIDC Identity Provider, this list will open for you to choose between Azure AD, ADFS, Okta, Others and follow the instructions for your specific provider.

AuthSettings_SSO_CHoose_OIDC_IdentityProvider

List of OIDC Identity Providers:

Customize how the Single Sign-On (SSO) option is triggered and which display name to show

After following the instructions provided for each specific SSO setup, use the Advanced Configuration options to set:

Show this IdP as a Sign-In Option on the Sign-In Page:

ON: When users from verified domains enter their email on the sign-in screen, they will see and be able to use the Single Sign-On (SSO) option that you have set up. Additionally, they can also use this option through your own Identity Provider (IdP)-initiated sign-in or via a custom URL provided by the application itself.

OFF: When users enter their email on the sign-in screen, the SSO option will not be visible or available to them on the application's sign-in screen. However, they can still sign in using your IdP-initiated sign-in or through a custom URL provided by the application itself.

Sign-In Button Text: Enter the display name that you want to present to your users when they see this option on the sign-in screen.

Multiple Single Sign On options for same domain(s) and how to control them

You can add or verify multiple domains within the same Authentication Settings organizations (tenants), in which case the option to sign in with this SSO is applicable by default to all users from the verified domains across all applications.

Example of two SSO setups performed on different Authentication Settings organizations (tenants), both of which include the domain example.com:


You can manage which applications can use the Single Sign-On (SSO) feature in your organization's setup. There are two lists you can use to do this: Allowed Applications and Excluded Applications, within the Policies of the organization or tenant where the SSO is configured.

© 2026 Visma