Best Practice: Read Before Enabling Single Sign-On
- Single Sign-on (SSO) must be enabled for all users except for one user, who is considered the SSO administrator. This user retains password access in case the IdP (Azure, Okta) is down; they can still log in to Procurify and disable SSO access. It is recommended that all accounts, maintain an SSO administrator for this purpose.
- Once users have been provided with access to Procurify, they will be able to activate their account with the setup email sent to them. The user has 24 hours to activate the account, once the email is sent.
- Please note, these steps are dependent on your Single Sign-on provider and may change without notice. Always refer to your Single Sign-on provider for the latest instructions.
- After setting up SSO for your domain, you must provide access to Procurify for every user that will be using Okta to sign in.
- Sign into your Okta domain with an administrator account and navigate to the Applications tab. Select the "Assign Applications" button.
- Select the web and mobile applications you created for Procurify from the column on the left, and select all users who will need access to Procurify from the column on the right.
Once users have been provided with access to Procurify, they will be able to activate their account with the setup email sent to them when Single Sign-on was first enabled.
Still need help?
Click here for assistance with troubleshooting Single Sign-on, or contact our Technical Support team by scrolling to the top of the following web page and selecting Contact Us available at the top right-hand side of the screen.