Setting up Single Sign-On (SSO) for authentication
Feature availability This feature is available with Business and Enterprise customers. See pricing plans for more details.

You can take advantage of your company's existing identity management systems, and have employees sign in to Snyk using their corporate identity. This makes provisioning Snyk to users easier. It also allows for deeper integration for group and organization membership, role-based access, and more.
Snyk can integrate with any SAML-based and OpenID Connect (OIDC)-based SSO, as well as ADFS. You can also use your Enterprise Identity Provider for SSO, including Azure AD and Google G Suite. Read more about SAML in the Auth0 documentation.

With SSO configured, users are provisioned with a new Snyk account when they first sign on through SSO, even if they previously created their own account.
The sign on process includes these steps:
  1. 1.
    When a user selects SSO from Snyk.io to log in, they are redirected to (and authenticated) by the identity provider you requested.
  2. 2.
    The identity provider communicates this authentication to Snyk servers, sending relevant data to Snyk in order to create each user.
  3. 3.
    Snyk checks the directory for that user.
  4. 4.
    If the user is already configured, Snyk enables the appropriate access. For a new user, Snyk adds the user to the directory, and then redirects them to Snyk.io with the appropriate access.

Export as PDF
Copy link
Edit on GitHub
On this page
Introduction
User authentication and provisioning
Also see