Skip to content

Enterprise SSO

SAML 2.0 single sign-on. Self-serve in 10 minutes, on Pro and above.

Route your team through Okta, Microsoft Entra, Google Workspace, OneLogin, JumpCloud, or any SAML 2.0 identity provider. Paste three identifiers into your IdP, add one DNS TXT record, SSO is live. No custom integration. No implementation call.

Wengrow supports SAML 2.0 single sign-on on the Pro, Business, and Business+ plans. Configure your identity provider — Okta, Microsoft Entra, Google Workspace, OneLogin, JumpCloud, or any SAML 2.0–compliant IdP — in about 10 minutes using a self-serve flow inside the admin panel. Domain ownership is verified via a DNS TXT record before SSO activates. Once active, every user on your verified domain routes through your IdP, with MFA delegated to your identity provider and every sign-in recorded in your workspace's audit log. JIT user provisioning is supported today. SCIM provisioning and IdP-initiated flow are on the roadmap — called out below.

How Wengrow SSO works

Three steps, each a few minutes:

  1. Paste three identifiers into your IdP. Create a SAML 2.0 application in Okta, Entra, or Google Workspace and paste Wengrow's ACS URL, Entity ID, and Metadata URL from Settings → SSO.
  2. Verify your domain with one DNS TXT record. Wengrow gives you the host and value; add it at Cloudflare, Route 53, GoDaddy, or wherever your DNS lives. Most registrars propagate in under a minute.
  3. That's it — SSO is enforced. Everyone on your verified domain routes through your IdP. Non-SSO sign-in paths (password, magic link, Google OAuth) are blocked at the API layer for users on that domain.

See the full 10-minute walkthrough for Okta, Entra, and Google Workspace — with screenshots, DNS examples, and rotation instructions.

SSO facts

Plans
Pro, Business, Business+
Protocol
SAML 2.0
Flow
SP-initiated (IdP-initiated on roadmap)
Identity providers
Okta, Microsoft Entra, Google Workspace, OneLogin, JumpCloud, any SAML 2.0 IdP
NameID formats
emailAddress, persistent
User provisioning
JIT on first sign-in (SCIM on roadmap)
MFA
Delegated to your IdP
Domain verification
DNS TXT record
Setup time
~10 minutes, self-serve
SAML validation
Signature + freshness + replay protection enforced; unsigned assertions rejected

Security model

Your audit log

On the roadmap, said plainly

SCIM provisioning and deprovisioning

Not in the current release. JIT provisioning handles creation (a user signs in via SSO for the first time; Wengrow creates their profile and tenant membership). Deprovisioning is handled by deactivating the user in your IdP plus "Revoke all SSO sessions" in Wengrow when you need immediate session invalidation.

SCIM is a roadmap item. If your procurement requires SCIM push-provisioning today, we're not your vendor yet — let us know and we can tell you when we expect to ship it.

IdP-initiated SSO

SP-initiated only in the current release. Users start from app.wengrow.app/login rather than from an Okta dashboard tile. IdP-initiated flow is on the roadmap.

SSO FAQ

Procurement

More questions from your security team?

We can walk your IT lead through our SAML validation policy — signature enforced, freshness (InResponseTo / NotOnOrAfter) checked, replay protected, unsigned assertions rejected — and answer your security questionnaire directly. Pro starts at $1,499/mo — a fraction of what enterprise-only platforms charge for the same SAML support.

SSO in 10 minutes. No sales call required.

Self-serve setup, DNS-verified domain, audit-logged sign-ins. Included on every Pro plan.