Supported Providers
Fiskil supports federation with many identity providers, including:Google Workspace and Gmail accounts
GitHub
GitHub organizational accounts
Microsoft
Azure Active Directory and Microsoft 365
Apple
Apple ID business accounts
Facebook business authentication
Twitter/X business accounts
Okta
Okta identity management platform
Azure AD
Azure Active Directory integration
OneLogin
OneLogin identity platform
Ping Identity
Ping Identity solutions
SAML/OIDC
Any SAML or OIDC-compliant IdP
Custom Provider
Contact support for additional providers
Authentication with additional OpenID Connect (OIDC) or Security Assertion Markup Language (SAML) 2.0 providers is available on request via the Fiskil team.
How to Enable SSO
SSO is not currently self-service. To enable it for your organization:1
Configure Your Identity Provider
Set up your identity provider using the relevant provider documentation (for example, Microsoft Azure AD or Google Workspace).
2
Contact Fiskil Support
Reach out to Fiskil Support through our Support Desk or via [email protected].Include the following information:
- Your SAML metadata URL or XML file
- Required domain restrictions (e.g.,
@company.com) - Any specific attribute mapping requirements
3
Configuration & Testing
Our team will configure SSO on your account and confirm when it’s active. We’ll work with you to test the integration before enabling it for all users.
4
User Access
Once enabled, users attempting to log in are redirected to your identity provider. After successful authentication, they return to the Fiskil Console signed in with the role assigned to them in Settings > Members.
SAML Support
Fiskil’s SSO implementation supports the SAML 2.0 protocol with comprehensive configuration options.Standard Features
- Attribute Mapping — Map user attributes from your IdP to Fiskil user profiles
- Just-In-Time Provisioning — Automatically create user accounts upon first login
- Domain Restrictions — Limit access to specific email domains
- Role Assignment — Automatically assign roles based on IdP group membership
Advanced Configuration
If your organization requires additional SAML configuration such as:- Custom attribute mapping
- Specific assertion requirements
- Advanced encryption settings
- Custom claim transformations
Getting Started
Enable SSO for Your Team
Contact our support team to begin configuring Single Sign-On for your organization.
SSO configuration typically takes 1-2 business days to complete, depending on the complexity of your requirements.