Single Sign-On (SSO)
Seal supports enterprise SSO, integrating with your existing identity provider for centralised authentication.Supported Identity Providers
| Provider | Protocol | Status |
|---|---|---|
| Microsoft Azure AD (Entra ID) | OAuth 2.0 / OpenID Connect | Available |
| Okta | SAML / OIDC | Available on request |
| Google Workspace | OIDC | Available on request |
| Custom SAML/OIDC | SAML 2.0 / OIDC | Available on request |
For other identity providers, contact [email protected].
How SSO Works

Domain-Based Routing
SSO is configured per organisation with specific email domains. Users with SSO-enabled domains are automatically redirected to the identity provider — password login is disabled for these domains.Configuration Options
| Option | Description | Example |
|---|---|---|
| Identity Provider | SSO provider | Microsoft Azure AD |
| Email Domains | Domains requiring SSO | acme.com, acme.co.uk |
| Tenant ID | Organisation’s Azure AD tenant (optional) | xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx |
Security
| Feature | Details |
|---|---|
| Enforced SSO | Password login disabled for SSO domains |
| No password storage | Seal never receives or stores SSO user passwords |
| MFA inheritance | Users inherit MFA requirements from IdP |
| Session timeout | Configurable per org (7-day default, 15-min for 21 CFR Part 11) |
Setup
To enable SSO, provide:- Email domains for SSO enforcement
- Azure AD Tenant ID
- Technical contact
Contact [email protected] to begin SSO setup.
User Provisioning
| Method | Description |
|---|---|
| Just-in-Time (JIT) | Users auto-created on first SSO login |
| Manual | Admins pre-create accounts |
| SCIM | Automated provisioning/deprovisioning from IdP (enterprise) |