SSO via Okta (or other Enterprise Identity Provider) is not included in the Free plan or standard Pro subscriptions. Please book time with our sales team or contact support if you are interested in enabling the SSO add-on option for your organization or discussing our Enterprise plans.
Supported identity providers
Supported identity providers
- Okta
- Entra ID (Azure AD)
- Google Workspace
- ADP
- Auth0
- CAS
- ClassLink
- Cloudflare
- CyberArk
- Duo
- JumpCloud
- Keycloak
- LastPass
- Login.gov
- Microsoft AD FS
- miniOrange
- NetIQ
- OneLogin
- Oracle
- PingFederate
- PingOne
- Rippling
- Salesforce
- Shibboleth
- Shibboleth Unsolicited
- SimpleSAMLphp
- VMware
- Up to date list: https://my.metaview.app/settings/integrations
Configuring SSO
Follow the steps below to set up Single Sign-On (SSO) for your organization. SSO simplifies login processes by allowing users to access multiple applications with a single set of credentials, improving security and streamlining user access. Please note that not all our subscription plans include SSO and additional charges may apply for its use.- Before starting, confirm with your team’s Success Manager (or the Metaview Suppport team) that your workspace is ready for SSO setup and that your domain has been verified.
- Sign in to Metaview, and navigate to
Settings
> Integrations. Please note you may need to be an admin to make changes. - Under Others, select
Manage SSO
. - Select your company’s
identity provider
from the list. - Follow the provider-specific setup instructions provided to complete the set up.
Troubleshooting
If your organization has set up SSO for Metaview, you should sign in using your work email, rather than theContinue with Google
or the Continue with Microsoft
options. If you select the wrong sign-in option, you will be redirected to your SSO provider login for authentication.
If you encounter the error message “User is not assigned to this application” you will need to contact your IT team and request them to give you access to Metaview.