Skip to main content

Single Sign-On (SSO) Overview

Enterprise SSO Walk-Through on BetaTesting

Updated today

BetaTesting supports SAML-based Single Sign-On (SSO) for Enterprise customers, allowing your team members to log in to BetaTesting using your company's identity provider (IdP). This eliminates the need for separate BetaTesting passwords and gives your IT team centralized control over access.

What is SSO?

Single Sign-On lets your employees authenticate through your company's existing identity provider - such as Okta, Microsoft Entra ID (Azure AD), OneLogin, or any provider that supports the SAML 2.0 standard - and be automatically signed in to BetaTesting.

Key Benefits

  • Centralized access control - Manage who can access BetaTesting directly from your identity provider

  • No separate passwords - Team members use their existing corporate credentials

  • Automatic account creation - New users are provisioned in BetaTesting automatically on first login (or via SCIM - see below)

  • Role mapping - Map your IdP groups to BetaTesting roles (Admin, Support, Read-Only, Tester) so permissions stay in sync

  • Deprovisioning - When you remove a user from the BetaTesting app in your IdP, they lose access to BetaTesting immediately

SSO + SCIM

BetaTesting also supports SCIM 2.0 (System for Cross-domain Identity Management) provisioning alongside SSO. SCIM allows your identity provider to automatically:

  • Create user accounts in BetaTesting when assigned in your IdP

  • Update user profiles when changes are made in your IdP

  • Deactivate accounts when users are unassigned or deprovisioned

  • Sync group memberships for automatic role assignment

SSO can be configured with or without SCIM. Without SCIM, user accounts are created on first login (just-in-time provisioning). With SCIM, accounts are pre-provisioned before the user ever logs in, giving you tighter control.

Supported Identity Providers

BetaTesting works with any identity provider that supports SAML 2.0, including:

  • Okta

  • Microsoft Entra ID (Azure AD)

  • OneLogin

  • Google Workspace

  • Ping Identity

  • JumpCloud

  • Auth0

  • Any other SAML 2.0-compliant provider

We have dedicated setup guides for Okta and a general guide for all other SAML providers.

How Setup Works

Setting up SSO is a collaborative process between your IT team and the BetaTesting team. Here's the high-level flow:

Step

Who

What Happens

1

You

Create a SAML application in your identity provider

2

You

Share your IdP metadata (SSO URL, certificate, issuer) with your BetaTesting account manager

3

BetaTesting

Configures the enterprise connection and provides you with the Assertion Consumer Service URL and Entity ID

4

You

Update your SAML app with the values BetaTesting provides

5

BetaTesting

Enables the SSO connection and configures allowed email domains and default roles

6

Both

Test SSO login to verify everything works

7

(Optional) Both

Configure SCIM provisioning and role mappings

Prerequisites

Before getting started, make sure you have:

  • An Enterprise plan on BetaTesting

  • Administrator access to your company's identity provider

  • The email domain(s) your team uses (e.g., yourcompany.com) -- these will be restricted to SSO login

Getting Started

Contact your BetaTesting account manager to begin the SSO setup process. They will guide you through each step and securely exchange the required configuration details.

For provider-specific instructions, see:

For automated user provisioning, see:

Did this answer your question?