- 23 Aug 2023
- 4 Minutes to read
- Print
- DarkLight
Configuring SSO in the Admin Panel
- Updated on 23 Aug 2023
- 4 Minutes to read
- Print
- DarkLight
The admin panel is a centralized tool to help Airtable admins manage their organization’s Enterprise account. Learn how to set up SSO logins for your organization.
Introduction
Plan availability | Business and Enterprise Scale only |
Platform(s) | Web/Browser, Mac app, and Windows app |
Related reading |
Setting up SSO in Admin Panel
After retrieving your organization's third-party SSO metadata, navigate to the Admin Panel and click on the Settings page in the navigation sidebar on the left. Next, click Security & Authentication.
Next, provide your sign-in url, certificate and, click Save.
The last configuration step is to determine which IdP provider you are integrating with Airtable. Okta and OneLogin configurations will need to be switched to V1 option in the dropdown. Other partner integrations will use the default V2 option.
All that’s left to do now is click Save. This will open a pop-up asking you if you are sure about the changes. Click Save again to allow the SSO login configuration to occur. Changes may take a few minutes to show up.
After clicking save, the Settings page will reload. To log out all users associated with the configured domain and enforce SSO, please navigate back to the SSO & Authentication section and check/uncheck the box under SSO required. Before requiring SSO for your own email domain, you must first log out and back in with SSO to verify that the metadata you've provided is correct.
From here you can also click Edit if future changes are necessary or if you want to delete the configuration.
Managing rotating SAML certificates
Navigate to Admin Panel, click the Settings option on the left sidebar, then click the Security & Authentication tab. From here, make sure that the domain that you are updating has the SSO required checkbox unchecked.
Click the Edit button under the SSO metadata column, then highlight and delete all of the previous SAML signing certificate, called the x.509 certificate in Airtable.
Access the new x.509 certificate from your IdP. In some cases, this may be referred to as a SAML signing certificate within the IdP that your organization uses. You'll want to copy this certificate for use in the next step.
Paste the contents of the new certificate that you just copied into the x.509 field in the metadata configuration window in Admin Panel. This information should already be blank after following Step 2 above. Click Save once the content has been pasted.
Recheck the SSO required option. In some cases, your organization may leave this off, in which case, you can skip this step.
SSO dependencies
- The NameID must be the user’s email address
- The NameID format can be EmailAddress or unspecified
- After editing your identity provider metadata, the changes may take up to 5 minutes to take effect.
- You can only add identity provider metadata for email domains federated under your Enterprise account.
- We only allow one set of identity provider metadata per email domain, globally. This means that if another enterprise account has already provided identity provider metadata for one of your email domains, you will need to talk to the admins of that account if you want to change the metadata.
- If you are trying to switch SSO from Optional mode to Required mode for your own email domain after editing the SSO identity provider metadata, we require that you verify that the metadata values you've provided are correct, by first logging out and logging back in using SSO.
FAQs
We support programmatic disabling/re-activating users via SCIM for Okta (and only Okta). For additional details and setup instructions, please read our support article.
Update user email addresses in the Admin Panel using these instructions and then have them sign into Airtable using their IdPs. After signing in, users should see their updated workspaces/bases and email addresses on the home screen.
- Delete the new account.
- Update the old account’s email address in the Airtable Admin Panel or through the Enterprise API.
- Have the user attempt to log in again through their IdP.