Configure SSO
The Context
Laura is a systems administrator at DesignStudio, a 35-person design studio. Her teams complain about having to log in separately to each tool: Figma, Notion, GitLab, Mattermost... Every week, she wastes time resetting forgotten passwords. She wants to implement Single Sign-On (SSO) to simplify everyone's life.
The Problem without SmartLink
- Each application has its own authentication system
- Employees create weak passwords to remember them
- Password resets consume IT time
- No consistency in authentication policies across tools
With SmartLink
Step 1 — Choose compatible applications
Laura checks SmartLink's SSO integration catalog. She finds preconfigured connectors for Notion, GitLab, Mattermost, Nextcloud, and many more.
Step 2 — Configure SSO (15 minutes per application)
For each application, Laura follows a step-by-step guide:
- She retrieves the SSO login information from SmartLink (Entity ID, callback URL)
- She enters them into the target application's admin interface
- She tests the connection
Step 3 — Deploy
Once SSO is activated, employees just need to click on the application in their SmartLink dashboard. Authentication is done automatically via their VaultysID — one simple gesture to access everything.
Step 4 — Remove passwords
With SSO in place, Laura can disable password authentication on applications that allow it. The number of password reset tickets drops to zero.
What Changes
| Without SmartLink | With SmartLink |
|---|---|
| One password per application | Single authentication via VaultysID |
| Weak and reused passwords | No passwords to remember anymore |
| Frequent password reset tickets | Zero password-related tickets |
| Complex SSO configuration | Step-by-step guides for each application |
Features Used
- 🔗 SSO Configuration — Setting up single sign-on
- 📖 SSO Integrations — Guides for GitLab, Notion, Mattermost, Nextcloud, etc.
- 🔐 VaultysID — Digital identity serving as a key for single authentication