Supported providers
Clippo supports SSO via:- SAML 2.0 — Okta, Azure AD, OneLogin, PingIdentity, and any SAML 2.0-compliant provider
- OIDC (OpenID Connect) — Google Workspace, Auth0, and any OIDC-compliant provider
Before you start
You’ll need:- Admin access to your Clippo Enterprise account
- Admin access to your identity provider (IdP)
- Your IdP’s metadata URL or XML file (for SAML), or Client ID and Secret (for OIDC)
Setting up SAML SSO
Open SSO settings in Clippo
Go to the Admin Dashboard, click Settings, then click Single Sign-On.[SCREENSHOT COMING SOON]
Copy the Clippo SP details
Clippo will show you the Service Provider (SP) details you need to enter in your identity provider:
[SCREENSHOT COMING SOON]
| Field | Value |
|---|---|
| ACS URL | Displayed on screen — copy this |
| Entity ID | Displayed on screen — copy this |
| Name ID format | emailAddress |
Configure your identity provider
In your IdP admin console, create a new SAML application using the SP details from the previous step. You’ll also need to configure these attribute mappings:
Assign the application to the users or groups that should have Clippo access.
| IdP attribute | Clippo attribute |
|---|---|
email | email |
firstName | firstName |
lastName | lastName |
Enter your IdP metadata in Clippo
Back in Clippo’s SSO settings, enter your IdP metadata. You can either:
- Paste your IdP metadata URL (recommended — stays in sync automatically)
- Upload your IdP metadata XML file
Test the connection
Click Test Connection. Clippo will open a new window and attempt to sign in via your IdP. If it works, you’ll see a success message.[SCREENSHOT COMING SOON]
Setting up OIDC SSO
Open SSO settings in Clippo
Go to the Admin Dashboard, click Settings, then click Single Sign-On.
Copy the Clippo redirect URI
Clippo will show you the Redirect URI to enter in your identity provider.[SCREENSHOT COMING SOON]
Configure your identity provider
In your IdP admin console, create a new OIDC application:
- Set the Redirect URI to the value from the previous step
- Set the Grant type to Authorization Code
- Copy the Client ID and Client Secret
Enter your OIDC details in Clippo
Back in Clippo, enter:
- Issuer URL (e.g.,
https://accounts.google.com) - Client ID
- Client Secret
Troubleshooting SSO
| Issue | Solution |
|---|---|
| Test connection fails | Double-check your ACS URL / Redirect URI in the IdP. Make sure attribute mappings are correct. |
| Users see “account not found” | The user’s email in the IdP must match their Clippo account email. Add them via the Admin Dashboard first. |
| Users can’t log in after enabling SSO | If SSO is set to “required,” all users must have matching IdP accounts. Switch to “optional” temporarily to debug. |