Skip to main content

Single Sign On Configuration

Beeceptor offers support for SAML 2.0-based Single Sign-On (SSO) login, allowing seamless integration with prominent identity management tools like Google Workspace, Azure Active Directory, Okta, among others, to delegate authentication for your users.


This feature is available with the Enterprise plan.

Azure Active Directory

Enabling Azure Active Directory (Azure AD) for Beeceptor login involves the following steps in the new Azure Management Console.

  1. You need to access the Microsoft Azure Management Console and navigate to Azure Active Directory in the navigation pane.
  2. Select 'Enterprise Applications' and follow the provided tutorial for setup.
  3. Follow the below tutorial for complete setup.

Beeceptor Configuration Details

For configuring the Beeceptor details in Azure SAML application setup, please use the following required attributes:

  • Identifier (Entity ID):
  • Reply URL (Assertion Consumer Service URL): azure-list-sso-attributes

Azure AD App Details

Map The Claims

To ensure Beeceptor receives attributes/claims from Azure AD, map the following attributes:

  • Update Unique User Identifier to user.mail.
  • Create displayName as new claim, and map it to user.displayname. azure-list-sso-attributes
  • You can optionally add Groups information to the claim for Beeceptor to enable a deeper access control. azure-list-sso-attributes

Response Signing

Beeceptor expects response as well as assertion signed. Use the following steps to enable it:

  1. Navigate to 'SAML Certificates' (step 3 on the same page) and click Edit.
  2. Within the 'Signing Option' section, opt for 'Sign SAML Response and Assertion'.
  3. Save your changes


Share With Beeceptor

To proceed further, provide the following information to Beeceptor support team:

  1. Your organization's email domain
  2. The Base64 encoded certificate
  3. Login URL
  4. Azure AD Identifier.

azure beeceptor share with support team

Optional Configuration

Additionally, to enhance the user experience, you can add the Beeceptor logo so that users can easily recognize the application. The Beeceptor logo is available at the following links:

azure add beeceptor logo

Assign Users Using Groups

Ensure to assign users or groups to the Beeceptor application. Only the assigned users will be able to see the Beeceptor app icon under "My Applications."

azure add users to beeceptor

  • Please note that Beeceptor does not support the syncing of Groups from Azure AD to Beeceptor. Permissions and roles are managed within Beeceptor per endpoint.

Test The Integration

The Beeceptor Support Team will complete the configuration for your domain. You can initiate testing once the support team confirms the setup. Just click the 'Test' button to validate the end-to-end integration.

It's worth noting that Beeceptor will automatically provision a user on their first login attempt. Users can log in to Beeceptor via SAML in two distinct methods:

IdP Initiated Login

Within your Microsoft or Office 365 account, click on App Launcher, click on All Apps and you will be able to see Beeceptor app there.

SP (Beeceptor) Initiated Login

Your users are requested to utilize the following link to access Beeceptor's Single Sign-On (SSO):

Google Workspace Directory

Beeceptor supports SAML based IdP initiated or SP initiate logins. Enabling Google Workspace for Beeceptor login involves the following steps in the Admin Console.

Open Apps Listing

  1. Open Admin Console.
  2. Navigate to Apps -> Web and mobile apps -> Add app -> Add custom SAML app


Creating A SAML App

You should give this application a name, say Beeceptor, and configure logo. Logo makes it easy for users to recognize the application. The Beeceptor logo is available at the following links:


Google Identity Provider Details

Copy the following three details from this step and share with Beeceptor support team.

  1. SSO URL
  2. Entity ID (Identifier of the IdP)
  3. Certificate: Download the certificate file.


Service Provider Details (from Beeceptor)

Enter the following values as Beeceptor's SAML configuration:

  • ACS URL (Assertion Consumer Service URL):
  • Entity ID (Identifier of the Service Provider):
  • Ensure that you tick the 'Signed Response' checkbox.
  • Map EMAIL as Name ID attribute.


Attribute Mapping

Map the following three required attributes and complete the setup.

  • Primary Email -> email
  • First Name -> firstName
  • Last Name -> lastName


Test The Application

As a user, log in to your email, then click on the top apps icon. You'll find Beeceptor listed as an application. Click on the Beeceptor logo to access and log in to Beeceptor.