--- title: "Single Sign-On" description: "" icon: 'key' --- ## Enforcing SSO You can enforce SSO by specifying the domain. As part of the SSO configuration, you have the option to disable email and user login. This ensures that all authentication is routed through the designated SSO provider. ![SSO](/resources/screenshots/sso.png) ## Supported SSO Providers You can enable various SSO providers, including Google and GitHub, to integrate with your system by configuring SSO. ### Google: ### GitHub: ### SAML with OKTA: ### SAML with JumpCloud: ![JumpCloud ACS URL](/resources/screenshots/jumpcloud/acl-url.png) ![JumpCloud User Attributes](/resources/screenshots/jumpcloud/user-attribute.png) JumpCloud does not provide the `HTTP-Redirect` binding by default. You need to tick this box. ![JumpCloud Redirect Binding](/resources/screenshots/jumpcloud/declare-login.png) Make sure you press `Save` and then Refresh the Page and Click on `Export Metadata` ![JumpCloud Export Metadata](/resources/screenshots/jumpcloud/export-metadata.png) Please Verify ` Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect"` inside the xml. After you export the metadata, paste it in the `Idp Metadata` field. Find the `` element in the IDP metadata and copy its value. Paste it between these lines: ``` -----BEGIN CERTIFICATE----- [PASTE THE VALUE FROM IDP METADATA] -----END CERTIFICATE----- ``` ![JumpCloud Assign App](/resources/screenshots/jumpcloud/user-groups.png)