Skip to main content

SSO And Identity Provider Support

Relayter supports OIDC SSO and SCIM v2 provisioning, including Auth0-based setups, with current limitations for SAML-only SCIM and IdP-initiated login.

Written by Simon Windt
Updated today

Relayter supports single sign-on through OpenID Connect (OIDC).

You can set up SSO in two ways:

  • Directly with your identity provider using OpenID Connect.

  • Indirectly through Auth0, where Auth0 acts as an intermediary layer between your identity provider and Relayter.

In both setups, users authenticate with an OpenID Connect based login flow.

Supported SSO Setups

Direct OpenID Connect

Relayter can connect directly to identity providers that support OpenID Connect. In this setup, your identity provider handles authentication and Relayter uses the OIDC configuration to sign users in.

OpenID Connect via Auth0

Relayter can also connect to Auth0 as the SSO layer. In this model, Auth0 acts as the intermediary between Relayter and your upstream identity provider. This is useful when your identity provider does not support OIDC. Relayter can provide the Auth0 account and integration.

User Provisioning With SCIM v2

For user and group provisioning, Relayter supports SCIM v2.

SCIM v2 can be used to automatically provision users into Relayter and associate them with the correct SSO configuration. This allows identity lifecycle management, such as creating, updating, and deactivating users, to be handled by your identity platform.

IdP-Initiated Login

IdP-initiated login means a user starts the login flow from the identity provider side instead of from Relayter. For example, a user clicks the Relayter application tile in their identity provider portal and expects to arrive in Relayter already signed in.

Relayter does not currently support IdP-initiated login. At the moment, SSO login must be initiated from Relayter.

Support for IdP-initiated login is planned for the near future.

Important Limitation

Many identity platforms do not offer SCIM v2 for modern OpenID Connect application integrations.

In practice, SCIM v2 is often only available through older SAML-based application templates. Relayter does not currently support SAML.

Because of this, some platforms can support SSO login with Relayter through OpenID Connect, but cannot support SCIM provisioning for Relayter at the same time. Full SSO and SCIM support depends on whether your identity platform supports SCIM alongside an OpenID Connect based integration.

In Summary

Relayter currently supports:

  • SSO through OpenID Connect

  • Direct OpenID Connect integrations

  • OpenID Connect integrations via Auth0

  • User and group provisioning through SCIM v2

Relayter does not currently support:

  • IdP-initiated login

  • SAML-based SSO

  • SCIM setups that require SAML-only application templates

Did this answer your question?