Why use SSO
- One set of credentials — users log in with their company account
- Centralized access control — disable a user in your IdP and they instantly lose HoopAI access
- Stronger security — enforce your organization’s password policies and MFA at the IdP level
- Reduced password fatigue — fewer passwords means fewer reset requests
Prerequisites
Before you begin, make sure you have:- An active HoopAI Enterprise subscription
- Admin access to your identity provider (Okta, Azure AD, Google Workspace, OneLogin, or any SAML 2.0-compatible IdP)
- Admin or Agency Owner role in HoopAI
Supported identity providers
| Identity provider | Status | Notes |
|---|---|---|
| Okta | Fully supported | Pre-built integration available |
| Microsoft Azure AD (Entra ID) | Fully supported | Enterprise application template |
| Google Workspace | Fully supported | Custom SAML app setup |
| OneLogin | Fully supported | Connector available |
| Custom SAML 2.0 | Supported | Any IdP that supports SAML 2.0 |
Step-by-step SAML setup
Navigate to Settings > Security > SSO / SAML. You will see three values you need to provide to your IdP:
https://app.hoopai.com/saml/metadatahttps://app.hoopai.com/saml/acshttps://app.hoopai.com/saml/metadata.xml Okta
- In Okta Admin, go to Applications > Create App Integration
- Select SAML 2.0 and click Next
- Set the App name to
HoopAI - Paste the ACS URL into the Single sign-on URL field
- Paste the Entity ID into the Audience URI field
- Set Name ID format to
EmailAddress - Add attribute statements (see attribute mapping below)
- Click Finish
- Copy the IdP Metadata URL from the Sign On tab
Azure AD
- In Azure Portal, go to Enterprise Applications > New Application > Create your own
- Name the app
HoopAIand select Integrate any other application (Non-gallery) - Go to Single sign-on > SAML
- Under Basic SAML Configuration, set:
- Identifier (Entity ID): paste from HoopAI
- Reply URL (ACS URL): paste from HoopAI
- Under Attributes & Claims, configure mappings (see below)
- Download the Federation Metadata XML or copy the App Federation Metadata URL
Google Workspace
- In Google Admin, go to Apps > Web and mobile apps > Add app > Add custom SAML app
- Name the app
HoopAI - Download the IdP metadata on the Google IdP details screen
- Set ACS URL and Entity ID using values from HoopAI
- Set Name ID format to
EMAIL - Add attribute mappings (see below)
- Click Finish and turn the app ON for the relevant organizational units
Custom SAML 2.0
- Create a new SAML application in your IdP
- Set the ACS / Consumer URL to the value from HoopAI
- Set the Audience / Entity ID to the value from HoopAI
- Configure Name ID as the user’s email address
- Add the attribute statements listed below
- Export your IdP’s metadata XML or copy the metadata URL
email or NameIDfirstNamelastNameroleadmin, user, or a custom role nameIf
firstName and lastName are not provided, HoopAI will use the portion before @ in the email as the display name.Do not enforce SSO until you have successfully tested the connection. Enforcing a broken SSO configuration can lock all users out.
- All users — every user must log in via SSO
- All users except admins — admins retain password login as a fallback
Just-in-time (JIT) user provisioning
When JIT provisioning is enabled, users who authenticate through your IdP are automatically created in HoopAI on their first login — no manual invitation needed. To enable JIT provisioning:- Go to Settings > Security > SSO / SAML
- Toggle Just-in-time provisioning to on
- Select a default role for newly provisioned users
- Optionally select a default team
SSO and two-factor authentication
| Scenario | Behavior |
|---|---|
| SSO enforced, 2FA enabled in HoopAI | HoopAI’s 2FA is skipped — your IdP handles MFA |
| SSO enforced, IdP has MFA | Users complete MFA at the IdP before reaching HoopAI |
| SSO not enforced, user chooses password login | HoopAI’s 2FA applies as normal |
For maximum security, enable MFA in your identity provider rather than relying on HoopAI’s built-in 2FA when SSO is active.
Disabling SSO / fallback to password login
If you need to disable SSO:- Log in as an admin (admins can always use password login if enforcement excludes them)
- Go to Settings > Security > SSO / SAML
- Toggle Enforce SSO to off
- All users regain access to password-based login
- Optionally, remove the SAML configuration entirely by clicking Delete SSO configuration
Troubleshooting SSO login failures
Certificate expired
Certificate expired
SAML assertions are signed with an X.509 certificate. If your IdP’s certificate has expired:
- Generate or renew the certificate in your IdP
- Download the new metadata XML
- Upload it in Settings > Security > SSO / SAML to update the certificate
- Test the connection again
Attribute mismatch — user not found
Attribute mismatch — user not found
This occurs when the email in the SAML assertion does not match any HoopAI user.
- Verify the
NameIDoremailattribute is set to the user’s primary email - Check for typos or domain mismatches (e.g.,
company.comvscompany.org) - If JIT provisioning is off, the user must be invited to HoopAI first
Clock skew error
Clock skew error
SAML assertions include timestamps. If your IdP server clock and HoopAI’s clock differ by more than 5 minutes, authentication fails.
- Sync your IdP server to an NTP time source
- Most cloud IdPs (Okta, Azure AD, Google) handle this automatically — check on-premise IdP servers
Redirect loop or blank page after login
Redirect loop or blank page after login
- Confirm the ACS URL in your IdP matches exactly what HoopAI provides (no trailing slashes)
- Clear browser cookies and try again
- Try in an incognito/private window
User sees password login instead of SSO
User sees password login instead of SSO
- SSO enforcement may not be turned on — check Settings > Security > SSO / SAML
- The user may be an admin excluded from enforcement
- The user may be accessing a direct password-login URL — share the SSO login URL instead
FAQ
Can I use multiple identity providers?
Can I use multiple identity providers?
HoopAI supports one SAML IdP configuration per account. If you need multiple IdPs, configure a federation proxy (e.g., Azure AD B2B) that aggregates them into a single SAML endpoint.
Does SSO work with the HoopAI mobile app?
Does SSO work with the HoopAI mobile app?
Yes. The mobile app redirects to your IdP’s login page in an in-app browser when SSO is enforced.
What happens if my IdP goes down?
What happens if my IdP goes down?
If SSO is enforced and your IdP is unreachable, users cannot log in. Keep at least one admin excluded from SSO enforcement so they can disable it in an emergency.
Is SCIM provisioning supported?
Is SCIM provisioning supported?
SCIM-based user provisioning and de-provisioning is available on select Enterprise plans. Contact your account manager for details.