Skip to main content

Setting Up Single Sign-On (SSO) with MarketScale

This guide provides instructions for IT administrators to set up Single Sign-On (SSO) for MarketScale for access management and security.

Updated yesterday

Prerequisites

Before beginning the SSO setup process, ensure you have:

  • Administrative access to your organization's identity provider (Azure AD, Okta, etc.)

  • Authority to create and configure enterprise applications

  • Your organization's verified domain

  • A list of users who need access to MarketScale

As per industry-standard practices and compliance requirements, your organization is responsible for:

  • Configuring your identity provider

  • Managing user access and permissions

  • Maintaining and updating your SSO configuration

  • Troubleshooting integration issues on your IdP side

Setup Process

Step 1: Initiate SSO Setup

  • Contact [email protected] with your IT department's email address

  • Specify that you want to set up SSO for your organization

  • Our team will respond with next steps

Step 2: Configure Your Identity Provider

We'll provide you with a link to the setup portal where you will:

  1. Verify your domain ownership

  2. Configure Single Sign-On settings

    • Select your identity provider (Azure AD, Okta, Google, etc.)

    • Follow provider-specific instructions to complete integration

  3. Set up Directory Sync to manage user access

Step 3: Verification and Activation

  • Reply to the setup email confirming you've completed the configuration

  • Our team will verify your setup and confirm that secure data is populating correctly

  • Once verification is complete, your users can begin accessing Studio via SSO

Common Issues and Troubleshooting

Issue

Possible Solution

Users cannot log in via SSO

Verify user accounts exist in both systems and are properly mapped

"Invalid configuration" error

Check that all URLs and certificates are correctly entered

"Domain not verified" message

Complete the domain verification process in the setup portal

Certificate errors

Ensure your IdP certificates are not expired

Provider-Specific Resources

Each identity provider maintains detailed documentation for SSO integrations:

Support Limitations

Please note that while we provide guidance for SSO setup, the configuration within your identity provider is your organization's responsibility. For issues specific to your identity provider configuration, please contact your provider's support team.

If you encounter issues with the Studio side of the integration, please contact [email protected] with details of the problem and any error messages you're receiving.

Frequently Asked Questions

Q: Can we use multiple identity providers?
A: Currently, Studio supports one identity provider per organization.

Q: How long does the SSO setup process typically take?
A: Most organizations complete the setup within 1-2 hours, depending on their familiarity with SSO configurations.

Q: Can we test SSO before rolling it out to all users?
A: Yes, we recommend setting up a test user in your identity provider to verify the integration works correctly before full deployment.

Q: What authentication protocols do you support?
A: Studio supports SAML 2.0 and OpenID Connect (OIDC) protocols for SSO integration.

Q: Do you support Just-In-Time (JIT) user provisioning?
A: Yes, with directory sync enabled, new users can be automatically provisioned when they first attempt to access Studio via SSO.

Did this answer your question?