Centralize your team’s access to Unblocked by connecting it to your Single Sign-On (SSO) provider. Unblocked supports SSO integrations with Okta, Google Workspace, Microsoft Entra ID, AWS Identity Center, and any other SAML 2.0 compliant provider.

Configure Single Sign-On

To connect Unblocked with your SSO provider:

  1. Navigate to the Settings section of the Unblocked web app.
  2. Under Team Settings, select Security.
  3. Locate the Single Sign-On section and click Configure.
  4. To complete the setup, follow the specific instructions relevant for your identity provider.

Configure AWS Identity Center

1

Create an AWS Identity Center application

From IAM Identity Center, navigate to the Applications tab, and click Add application.

Under Setup preference, select I have an application I want to set up.

Under Application type, select SAML 2.0.

Click Next and enter Unblocked as the application name.

2

Configure IAM Identity Center metadata

Copy the following information from the IAM Identity Center metadata section and paste it into Unblocked.

  • IAM Identity Center sign-in URL
  • IAM Identity Center SAML issuer URL
  • IAM Identity Center Certificate
3

Application properties

Leave the Application properties section in AWS blank.

4

Configure Application metadata

Copy the following values from Unblocked into the Application metadata section in AWS identity center:

  • Application ACS URL
  • Application SAML audience
5

Configure attribute mappings

From the Actions menu, select Edit attribute mappings.

Then enter the following mappings:

User attribute in UnblockedUser attribute in Identity CenterFormat
Subject${user.email}emailAddress
givenName${user.givenName}basic
familyName${user.familyName}basic
6

Assign Users

Assign users and groups to your AWS Identity Center application to grant them access to Unblocked.

Configure Google Workspace

1

Create a Google SAML App

From your Google Workspace Admin dashboard, go to Web and mobile apps. Then, from the Add app dropdown, select Add custom SAML app.

2

Enter App details

Enter “Unblocked” as the app name and click Continue.

3

Copy Google Identity Provider details into Unblocked

Copy the following three values from the SAML application into the Configure SSO form in Unblocked:

  • SSO URL
  • Entity ID
  • Certificate
4

Configure SAML Settings

On the Service provider details page, enter the following:

  • ACS URL: provided from Unblocked
  • Entity ID: provided from Unblocked
  • Name ID format: EMAIL
  • Name ID: Basic Information > Primary email
5

Configure Attribute Mapping

Enter the following three attribute statements:

Google Directory AttributeValue
Primary emailemail
First namefirstName
Last namelastName
6

Click Finish

Click Finish to save your changes.

7

Assign Users

On the next page, assign users and groups to the Google SAML application to grant them access to Unblocked.

Configure Microsoft Entra ID

1

Create a Microsoft Entra ID Application

From your Microsoft Entra ID admin dashboard, navigate to the Enterprise applications tab. Click New application, then click Create your own application to create a new application using SAML.

Enter “Unblocked” as the app name and click Create.

2

Configure Basic SAML Configuration

Click Set up single sign on and select SAML.

Enter the following values for the Basic SAML Configuration:

  • Identifier (Entity ID): copy value from Unblocked Single Sign-On settings
  • Reply URL (Assertion Consumer Service URL): copy value from Unblocked Single Sign-On settings

Leave other fields blank.

3

Configure Attributes & Claims

The default attribute and claim mappings are sufficient for Unblocked. It should look like this:

4

Set up Unblocked

From the SAML Certificate section of your Microsoft Entra ID application, download the Base64 certificate and copy the contents of the downloaded file into the Certificate field in Unblocked.

Then, copy the following two values from your new application into Unblocked:

  • Login URL
  • Microsoft Entra Identifier
5

Assign Users

Assign users and groups to your Microsoft Entra ID application to grant them access to Unblocked.

Configure Okta

1

Create an Okta Application

From your Okta admin dashboard, navigate to the Applications tab. Click Create App Integration to create a new application using SAML 2.0.

Enter “Unblocked” as the app name and click Next.

2

Configure SAML Settings

Enter the following four values:

  • Single sign-on URL: provided from Unblocked
  • Audience URI (SP Entity ID): provided from Unblocked
  • Name ID format: EmailAddress
  • Application username: Email
3

Configure Attribute Statements

Enter the following two attribute statements:

NameName formatValue
firstNameBasicuser.firstName
lastNameBasicuser.lastName
4

Click Next

Click Next to proceed to the next step, then click Finish to save your changes.

5

Copy SAML metadata into Unblocked

From the Sign On tab of your Okta application, copy the following three values from your new Okta application into the Configure Okta form in Unblocked:

  • Sign on URL
  • Issuer
  • Signing Certificate
6

Assign Users

Assign users and groups to your Okta application to grant them access to Unblocked.

Configure Other SAML Providers

1

Create a SAML Application

From your identity provider admin dashboard, create a new SAML 2.0 application.

2

Copy service provider metadata to your SAML app

Your SAML identity provider (IdP) requires the following metadata information to trust Unblocked as a service provider. You can copy and paste this information, or type it in the service provider configuration interface for your IdP.

  • Assertion Consumer Service (ACS) URL
  • Service Provider Entity ID

Ensure that the application username in your SAML app is set to the user’s email address. (This is also commonly referred to as the subject or name ID.)

3

Map user attributes

Enter the following two attribute statements:

SAML App Attribute NameName formatUnblocked Attribute Name
User Given NameBasicfirstName
User Family NameBasiclastName
4

Enter identity provider metadata

Copy and paste the following metadata information from Unblocked into your SAML app:

  • Identity Provider Sign-in URL
  • Identity Provider Entity ID
  • Identity Provider X509 Certificate
5

Assign Users

Assign users and groups to your new SAML application to grant them access to Unblocked.

User and Group Provisioning

Once you’ve configured SSO, you can enable user and group provisioning to automatically manage user access to Unblocked. This feature allows you to automatically create, update, and deactivate users in Unblocked based on changes in your identity provider.

Unblocked is a fully-compliant SCIM 2.0 service provider and supports user and group provisioning from any SCIM-compliant identity provider. To connect Unblocked with your identity provider:

  1. Navigate to the Settings section of the Unblocked web app.
  2. Under Team Settings, select Security.
  3. Locate the SCIM User and Group Provisioning section and click Configure.
  4. Click Add Token to generate a new API token for SCIM provisioning. Copy both the new API token and the Base URL.
  5. To complete the setup, follow the specific instructions relevant for your identity provider.

Configure Microsoft Entra ID Provisioning

1

Navigate to Provisioning

From your Microsoft Entra ID admin dashboard, navigate to your previously created Unblocked Application. Select the Provisioning options from the Manage menu, or you can select the Provision User Accounts tile.

2

Setup Provisioning

On the following page enter the following details:

  • Set the Provisioning Mode to Automatic.
  • Set the Tenant URL to the Base URL that you copied earlier from Unblocked.
  • Set the Secret Token to the API Token that you copied earlier from Unblocked.

Click Test Connection to verify the connection, and then click Save.

3

On the Provisioning Overview page, click Start Provisioning to begin syncing users and groups from Microsoft Entra ID to Unblocked. This completes the setup for SCIM provisioning from Okta to Unblocked.

Configure Okta Provisioning

1

Enable SCIM Provisioning

From your Okta admin dashboard, navigate to your previously created Unblocked Application. On the General tab, click Edit and set the Provisioning toggle to SCIM. Then click Save.

2

Setup SCIM Connection

On the Provisioning tab, click Integration under settings, and then Edit.

  • Set the SCIM connector base URL to the Base URL that you copied earlier from Unblocked.
  • Set the Unique identifier field for users to email.
  • Check the following for the Supported provisioning actions:
    • Push New Users
    • Push Profile Updates
    • Push Groups
  • Set the Authentication method to HTTP Header.
  • Set the Authorization field to the API Token that you copied earlier from Unblocked.

Click Test API Credentials to verify the connection, and then click Save.

3

Configure Provisioning to Unblocked

On the Provisioning tab, click To App under settings, and then Edit.

  • Set the following Provisioning to App toggles to Enabled:
    • Create Users
    • Update User Attributes
    • Deactivate Users

Click Save.

4

Push Groups

On the Push Groups tab choose the groups you want to push to Unblocked. This completes the setup for SCIM provisioning from Okta to Unblocked.

Enforce SSO

Once SSO is configured, you can enforce its use for your team. This means all team members will be required to sign in using your SSO provider.

There are two enforcement options:

  • SSO Only: Users will be required to sign in to Unblocked using SSO. You may need to sign in with SSO before enabling this option.

  • SSO or Source Code System: Users can sign in using either SSO or their source code system (e.g., GitHub, Bitbucket, or GitLab).

Allowed Email Domains

Verifying a domain ensures that users who enter an email address from that domain on the Unblocked sign-in page are automatically directed to your SSO login. This creates a seamless login experience and routes users through the correct authentication flow.

You can add multiple domains to enable SSO login detection for users with different email addresses. To verify a domain:

1

Add Domain

Click Add Domain and enter the domain name you want to verify.

2

Verify Domain

Unblocked will prompt you to add a TXT record to your DNS settings to complete the verification.

Once the domain is verified, any user who enters an email address matching that domain on the Unblocked sign-in page will see the SSO login option for your SAML provider.

Verifying a domain only controls the visibility of the SSO login option and does not automatically grant access to your Unblocked team. Access to Unblocked is still managed through user and group assignments in your identity provider (IdP).

To help your users easily recognize Unblocked in their identity provider dashboard, download the Unblocked logo for use in your SSO application.