Skip to main content

Juristat Single Sign-On (SSO)

How to configure Juristat SSO for your organization

L
Written by Leah Christians

Overview

This guide explains how to configure Single Sign-On (SSO) for your organization. Once enabled, your users will authenticate through your existing Identity Provider (IdP) rather than managing a separate username and password.

Supported Connections

Juristat uses Auth0 for authentication. If you plan to set up a SAML or OIDC connection, continue with this document. If you would like to create a specific connection to one of the following providers, reach out to security@juristat.com and schedule a time to build the connection together.

  • Active Directory/LDAP

  • ADFS

  • Azure Active Directory Native

  • Google Workspace

  • Okta Workforce

  • PingFederate

  • Azure Active Directory

Note that many of these also provide SAML or OIDC options; Juristat has no preference.

Connection Type

Juristat needs specific information depending on the connection type. In either case, either Juristat needs a test user to validate the connection or you need to set up a time with security@juristat.com to validate the connection with your own internal test users.

SAML

Juristat will need

  • Sign In URL

  • X509 Signing Certificate

  • The SAML attributes for

    • Email

    • First or given name (eg John of John Smith)

    • Last or family name (eg Smith of John Smith)

OIDC

If your provider does not support OIDC discovery, you will need to schedule a time with security@juristat.com.

Juristat will need

  • OIDC Discovery URL

  • Client ID

  • Client Secret

You may need to configure your provider with the following callback URLs:

Did this answer your question?