Advice and answers from the Teamdeck Team

SSO Integration

Artur Gutkowski
Written by Artur Gutkowski

Learn how to configure and login using Single Sign-On (SSO).


Single Sign-On (SSO) lets members sign in to a Teamdeck workspace using their company credentials (such as Google Workspace, Okta, or Azure AD) instead of a separate Teamdeck password. SSO is configured per workspace by an admin and, once enabled, allows members to authenticate via their identity provider.

Who can use SSO

  • Admins / workspace owners: Configure SSO under SettingsIntegrations.

  • Members and invited users: Use the Log in using SSO option on the login page to sign in with company credentials.

Setting up SSO

SSO configuration panel in Settings → Integrations

Workspace admins configure SSO by providing details from their identity provider (IdP) or IT team.

  1. Navigate to SettingsIntegrations.

  2. Open the Single Sign-On (SSO) card.

  3. Enter the following identity provider details:

    • Entity ID: Unique identifier for your IdP.

    • SSO URL: The sign-in endpoint provided by your IdP.

    • X.509 Certificate: Security certificate from your IdP.

  4. Optionally, configure Allowed Email Domains:

    • Restrict SSO to specific domains (e.g., company.com or *.company.com).

    • Leave empty to allow any domain (subject to workspace membership or invitation).

  5. Choose an SSO User Provisioning option:

    • Automatically create users on first SSO login: New users are added to the workspace when they sign in via SSO for the first time (Just-In-Time provisioning).

    • Require invitation to join the organization: Only users with an existing account or invitation can sign in via SSO.

  6. Optionally, enable SSO Enforcement & Exceptions:

    • Check Disable owner bypass to require the workspace owner to also use SSO (no fallback to email/password for that workspace).

  7. Copy the Teamdeck service provider details displayed on the screen:

    • Assertion Consumer Service (ACS) URL

    • Entity ID

    Provide these to your IT team or IdP administrator when configuring Teamdeck as an application in your identity provider.

  8. Click Save.

Signing in with SSO

SSO login page with email input and Sign in with SSO button

Once SSO is configured, members can sign in using their company credentials.

  1. On the Teamdeck login page, click Log in using SSO.

  2. Enter your work email address and click Sign in with SSO.

  3. If you have access to multiple workspaces, select the workspace you want to access. If you have access to only one, you will be redirected automatically.

  4. You are redirected to your company's identity provider login page.

  5. Sign in with your company credentials.

  6. After successful authentication, you are signed in to Teamdeck and redirected to the workspace (for example, the Calendar view).

If authentication fails (for example, your email domain is not allowed or you have not been invited), you will be returned to the SSO login page with an error message.

SAML authentication failed error on SSO login screen

SSO and invitations

When SSO is enabled for a workspace, invitation emails sent to new members include a special SSO link. Invited users follow the link and sign in using their company credentials instead of creating a Teamdeck password.

Troubleshooting

  • SAML authentication failed: Verify that the Entity ID, SSO URL, and X.509 Certificate entered in Teamdeck match the values provided by your identity provider. Ensure your IT team has configured the ACS URL and Entity ID correctly on the IdP side.

  • User not allowed to sign in: Check the Allowed Email Domains setting. If domains are restricted, ensure the user's email matches one of the allowed domains. Also confirm the user has been invited if the provisioning mode is set to Require invitation to join the organization.

  • Owner cannot sign in with SSO: If Disable owner bypass is enabled, the workspace owner must use SSO. If the owner needs to regain access via email/password, contact Teamdeck support or have another admin disable this setting.