SSO
Configure Single Sign-On on Spike.sh
This guide explains the settings you’d need to use to configure SAML with your Identity Provider. Once this is set up you should get an XML metadata file which you can provide to Spike and start using SSO.
Follow the configurations given below while configuring your SAML with your IdP.
The below values will be the same for Okta, Microsoft Azure AD, Google, and other IdPs.
- Assertion consumer service URL / Single Sign-On URL / Destination URL:
https://app.spike.sh/sso/oauth/saml
- Entity ID / Identifier / Audience URI / Audience Restriction:
https://app.spike.sh
- Response:
Signed
- Assertion Signature:
Signed
- Signature Algorithm:
RSA-SHA256
- Assertion Encryption:
Unencrypted
Guides for setting up SAML with other IdPs
For example, in the case of Okta users, this is how the configuration looks

SAML configurations
Add user mappings as shown below. Note that
email
, firstName
and lastName
are mandatory.
Mappings
Paste the IdP XML Metadata and save.



Use that slug at the time of login.
Last modified 1mo ago