A SAML 2.0 (Security Assertion Markup Language) is an open standard protocol that enables Single Sign-On that provides authorization and authentication to web-based applications, in this case, Document360.

Supported Identity providers

  • Okta

  • Azure AD (Active Directory)

  • Google

Accessing the SAML SSO page

  1. Once you've logged in to Document360, choose your intended project
  2. From the dashboard SettingsUsers & SecuritySAML/OpenIDSAML


Quick setup using Okta

Follow the setup guides below to get your SAML SSO configured quickly.

  1. Sign up for Okta, Add an application in Okta, and Create a SAML integration
  2. Configure the created application on Okta with your Document360 project
  3. Add or Invite SSO users
  4. Mapping the same SSO connection in different projects

Once you have successfully configured the SAML SSO with Okta, you can invite members from your project to the configured SSO application.


SSO users can log in either as a Document360 or an SSO user. On the initial Login page, click on the SSO option.

Once you click on the SSO option, you are redirected to the SSO user Login page.

Can I add the email domains of different identity providers in the SAML configuration?

All the email domains must be obtained from the same identity provider.