We're not limited to only Google and Okta, we do support setup with any IdP. We just don't have the documentation to walk you through other IdP's but please send us the necessary information so we can manually enable SSO for you:
Identity Provider SSO URL
Identity Provider Issuer
Certificate (Download this and send as an attachment to your Vitally contact)
Q: Do you support SAML just-in-time provisioning?
A: Yes, Vitally supports SAML just-in-time provisioning. When a user logs in for the first time using SAML, a user will created for them in Vitally. If you've added the vitallyRole attribute, that will determine the user's permission level in Vitally. Otherwise, they will default to being a 'restricted' user.
Q: Will users be able to log in with a password anymore?
A: No, password login is disabled as soon as SAML 2.0 login is enabled.
Q: Will SAML login go into effect immediately?
A: Existing user sessions will be valid for up to 7 days. Ask each of your users to log out and log back into Vitally to force them to immediately start using SAML login.
Q: Where do I invite new team members once SAML is enabled?
A: The ability to invite team members to join Vitally has been disabled within the Vitally app. Any new Vitally access will need to be provisioned through your SSO provider.
Q: Where can I set the default role for new Vitally users when SAML is enabled?
A: vitallyRole can be passed as an attribute with a string value for admin, leader, team, or observer. If you're not sending that attribute, Vitally can default to the permission set you define under Settings -> Account & Billing -> Default role for new users.
If you send vitallyRole on each user profile, we will respect that setting every time the user logs into Vitally. Any changes made to permissions within the Vitally app will be reset the next time the user re-authenticates via SAML.