Configuring SSO Login
  • 1 Minute to read
  • Dark
  • PDF

Configuring SSO Login

  • Dark
  • PDF

This article is for our SAP, Oracle and Salesforce users who want to login with their organizational login credentials.
Salesforce users who want to login with their Salesforce credentials, click here

To allow users to seamlessly login to Panaya using their own organizational credentials, follow the instructions below.

The Token URL must be accessible from outside of your organizational secured servers

We will require an OpenID Scope Claim (please configure your IDP with scope: OpenID+ Email), as in this article:

  1. Click on the Settings button to open up the Settings panel.
  2. In the Security section, select View & Manage Single Sign On (Open ID Connect)
  3. Fill in the details, and click Save.
  4. Click on Check Configuration
  5. On the right-hand side of the screen, use your organizational login credentials to log in.
    This will verify the success of the configuration.  
    For Redirect URL on your IDP use - or (depending on your specific Panaya site).

    Here are some useful resources - 
  6. If the configuration is successful, the following confirmation message would appear.
    Click on Continue To Log In With SSO. This will verify the IDP configuration and will allow you to re-login to Panaya via SSO.
  7. To roll out the configuration to all organizational users, click on Roll Out To All Users.
    The Identify Provider Configuration will show as Active.
    Users should now be able to log in via SSO login with their organizational credentials.
  8. To deactivate SSO and roll back to Panaya login, click on deactivate SSO Configuration.
Known Limitation
When setting the PING IDP OAuth connection, the Tests e-sign cannot be used in Panaya. This is due to the implementation of OIDC.