How to configure your SSO provider at HQ
Authentication and Single Sign-On (SSO)
In addition to the standard email and password login, Mitratech HQ can be configured to authenticate users in your organization via SAML.
SAML
SAML (Security Assertion Markup Language) is an open-standard protocol for securely exchanging authentication and authorization data between an Identity Provider (IdP) and a Service Provider (SP) — in this case, Mitratech HQ.
HQ supports integration with any SAML 2.0-compliant identity provider to deliver a seamless and secure login experience.
Once users authenticate through your organization’s IdP, they gain instant, one-click access to Mitratech HQ — simple, fast, and secure.
OAuth
OAuth (Open Authorization) is an open-standard protocol that allows secure authorization between applications without sharing user credentials. It enables an Identity Provider (IdP) to grant limited access to a Service Provider (SP) — in this case, Mitratech HQ — on behalf of the user.
HQ supports OAuth 2.0 integration exclusively through Google Login.
Users can sign in with their Google Workspace or personal Google accounts for a simple, secure, and password-free login experience.
Once users authenticate with Google, they gain instant access to Mitratech HQ.
Supported Identity Providers
Mitratech HQ has been confirmed to integrate successfully with:
| Provider | Protocol | Status |
|---|---|---|
| Okta | SAML 2.0 | ✅ Fully Supported |
| MS Azure / Entra | SAML 2.0 | ✅ Fully Supported |
| OneLogin | SAML 2.0 | ⚙️ Supported via generic SAML configuration |
| Ping Identity | SAML 2.0 | ⚙️ Supported via generic SAML configuration |
| Active Directory Federation Services (AD FS) | SAML 2.0 | ⚙️ Supported via generic SAML configuration |
| Other SAML 2.0 Providers | SAML 2.0 | ⚙️ Supported |
| Google Log In | OAuth | ⚙️ Supported |
Warning:
Integrations with providers other than Okta and MS Azure / Entra are supported through generic SAML 2.0 setup.
While they should work as expected, Mitratech Support may request your IdP metadata or logs for troubleshooting
Before You Begin
-
Ensure you have admin rights in both HQ and your Identity Provider (IdP).
-
Collect the following values from HQ Settings:
-
Single Sign-On URL
-
Audience URI (Entity ID)
-
-
Your IdP must support SAML 2.0 metadata exchange.
Once configured, users in your organization will log in directly via your Identity Provider instead of entering credentials on the HQ login page.

