Overview
This guide explains how to configure Single Sign-On (SSO) for your organization. Once enabled, your users will authenticate through your existing Identity Provider (IdP) rather than managing a separate username and password.
Supported Connections
Juristat uses Auth0 for authentication. If you plan to set up a SAML or OIDC connection, continue with this document. If you would like to create a specific connection to one of the following providers, reach out to security@juristat.com and schedule a time to build the connection together.
Active Directory/LDAP
ADFS
Azure Active Directory Native
Google Workspace
Okta Workforce
PingFederate
Azure Active Directory
Note that many of these also provide SAML or OIDC options; Juristat has no preference.
Connection Type
Juristat needs specific information depending on the connection type. In either case, either Juristat needs a test user to validate the connection or you need to set up a time with security@juristat.com to validate the connection with your own internal test users.
SAML
Juristat will need
Sign In URL
X509 Signing Certificate
The SAML attributes for
Email
First or given name (eg John of John Smith)
Last or family name (eg Smith of John Smith)
OIDC
If your provider does not support OIDC discovery, you will need to schedule a time with security@juristat.com.
Juristat will need
OIDC Discovery URL
Client ID
Client Secret
You may need to configure your provider with the following callback URLs:
