Managing Single Sign On (SSO) in Expensify
Expensify supports Single Sign-On (SSO) through the SAML protocol, allowing you to optimize user authentication and improve security across your organization. Whether you’re an IT admin configuring your domain or a team lead ensuring secure user access, this guide walks you through setting up and managing SAML SSO for your Expensify account
Accessing SAML Settings
⚠️ Pre-requisite: Ensure your domain is verified.
- Navigate to: Settings > Domains > [Domain Name] > SAML.
- From the Domains page:
- Download Expensify’s Service Provider Metadata to provide to your Identity Provider.
- Enter the Identity Provider Metadata from your SSO provider. (Contact your provider if unsure how to obtain this).
- Enable the “SAML required for login” option, ensuring users sign in via SSO only.
Provider-Specific Setup Instructions
Click on your Identity (SAML) Provider for detailed steps:
- Amazon Web Services (AWS SSO)
- Google SAML (Gsuite)
- Microsoft Entra ID (formerly Azure Active Directory)
- Okta
- OneLogin
- Oracle Identity Cloud Service
- SAASPASS
- Microsoft ADFS (instructions below).
Note: If your provider isn’t listed, contact them directly for guidance.
FAQ and Troubleshooting
User Login with SSO
- Employees using their company email or a secondary linked email (e.g., Gmail) will be prompted to log in through SSO.
- Secondary login setup guide: Change or Add Email Address.
Error During SSO Setup?
- Use samltool.com to validate your configuration data.
- Contact your Account Manager or Concierge for further help.
What is Expensify’s Entity ID?
- Default:
https://expensify.com
- For Multi-Domain setups:
https://expensify.com/mydomainname.com
.
Managing Multiple Domains with One Entity ID
Yes, it’s possible. Contact Concierge or your Account Manager to enable this feature.
Updating Microsoft Entra ID SSO Certificate
Steps to avoid configuration errors during certificate renewal:
- Create a new certificate in Microsoft Entra.
- Remove the old certificate before activating the new one.
- Replace the IDP in Expensify with the new one.
- Log in via SSO.
If issues persist, contact Concierge for assistance.
Advanced Configurations
Okta SCIM API for User Deactivation
Ensure your domain is verified and the SAML setup is complete. Then, do the following:
- Go to Settings > Domains > [Domain Name] > SAML.
- Enable SAML Login and toggle Required for login.
- In Okta, add Expensify as an application, and configure user profile mappings.
- Request Okta SCIM API activation via concierge@expensify.com.
- Integrate the SCIM token with Okta API provisioning.
Refer to the full setup in Okta’s documentation for attribute mapping and provisioning options.
Microsoft ADFS SAML Authentication
- Open ADFS Management Console and add a new trust.
- Import Expensify’s metadata XML from the SAML page.
- Configure LDAP Attributes for email or UPN.
- Add two claim rules:
- Send LDAP Attributes as Claims.
- Transform Incoming Claim (Name ID).