Skip to main content
Single Sign-on

Integrate your company’s identity platform with Funnel, allowing each team member to sign in without entering username and password

Rickard Nordstrand avatar
Written by Rickard Nordstrand
Updated over 2 weeks ago

Sign in with Google

The ability to sign in using Google is available to all subscriptions, just click the “Sign in with Google” button instead of entering your Funnel password.

Enterprise SSO

For additional security and centralized control we recommend using Enterprise SSO. We support a wide range of Identity providers and protocols, such as:

Supported Identity Providers

  • Active Directory/LDAP

  • Google Workspace

  • Microsoft Azure AD

  • OpenID Connect

  • Okta Workforce

  • PingFederate

  • SAML

Okta app

If you are an Okta customer, you can use the Funnel Okta app from the Okta Integration Network for easily setting up SAML SSO. After adding the app to your Okta account, follow the instructions to complete the setup.

Service Provider (SP) Initiated Sign-in

Funnel supports SP initiated sign-in. This means that a user signs in via the Funnel app, gets redirected and authenticated using their own Identity Provider (IdP) and then allowed into the app.

Home Realm Discovery

In order to use SP initiated Sign-in, your users' email domain(s) will have to be configured to initiate user authentication with your IdP. This is called Home Realm Discovery (HRD) and ensures seamless redirection to your IdP when signing in to the app.

Please contact support if you want to enable SP initiated sign-in and HRD for your subscription.

Identity Provider (IdP) Initiated Sign-in

Funnel also supports IdP initiated sign-in. This authentication flow starts from the customer's IdP portal and sends a security token to the Service Provider, granting access to the Funnel app.

Login methods

As a security feature you can select which login methods should be active for your subscription. For instance, you can use this to disable all password logins and force all users to use your own SSO provider with Two Factor Authentication (2FA).

Did this answer your question?