Integrating Brightflag with Your Company’s Single Sign-On (SSO) Tool

Integrating Brightflag with your company’s Single Sign-On (SSO) tool allows colleagues to seamlessly access the Brightflag platform without needing to log in manually.

Brightflag supports integration with most SSO platforms, ensuring quick setup with guidance from your designated Brightflag Implementation Manager or Customer Success Manager.


Common SSO Platforms for Integration

Brightflag can integrate with nearly any SSO platform. Below are guides for some of the most commonly used platforms:

  • Microsoft Azure
  • Google
  • Active Directory Federation Services (ADFS)
  • Okta

Setting Up a Google SSO Connection with Brightflag

Follow the steps below to set up a Google SSO connection with Brightflag:

  1. Go to Google Admin Console (https://admin.google.com).
  2. Click on Apps.
    mceclip8.png
  3. Click on SAML Apps.
    mceclip7.png
  4. Click on the Yellow + button.
    mceclip6.png
  5. Select SETUP MY OWN CUSTOM APP.
    mceclip5.png
  6. Download the Certificate and IDP metadata, then send them to your Brightflag contact.
    mceclip4.png
  7. Enter a name for your custom app, e.g., Brightflag, and click Next.
    mceclip3.png

Service Provider Details

Depending on your location, Brightflag uses different configurations. If you are unsure which region to select, contact your Implementation Manager.

Domain Region Prefix
app.brightflag.com app
enterprise.brightflag.com enterprise
aus.brightflag.com aus
  • ACS URL: https://{region_prefix}.brightflag.com/consumeSaml
    (Replace {region_prefix} with the region-specific prefix from the table above.)

  • Entity ID: https://{region_prefix}.brightflag.com

  • Start URL: https://{region_prefix}.brightflag.com/saml/{CompanyName}
    (Replace {CompanyName} with your company's name.)

  1. Ensure NameID is mapped to Primary Email with the format set to EMAIL.
    mceclip2.png
  2. Click Add New Mapping and finish the setup.
    mceclip0.png

Attribute Mapping

  1. Username should have the following mapping:
    • From: Basic Information
    • To: Primary Email
  2. Click Finish.
    mceclip1.png

Tips for Successful Integration

🟢 Note: If you are unsure about any of the fields or configuration, don’t hesitate to reach out to your Brightflag Implementation Manager for assistance.

⚠️ Warning: Ensure that the NameID is correctly mapped to Primary Email. Failure to do so may result in login issues.


Troubleshooting SSO Integration Issues

If you encounter any issues during the integration process:

  1. Check the ACS URL and Entity ID – Ensure the region-specific prefix is correctly entered (e.g., app, enterprise, aus).
  2. Verify Attribute Mapping – Confirm that Username is correctly mapped to Primary Email.
  3. Contact Support – If problems persist, contact your Brightflag support team or Implementation Manager for further troubleshooting.

Keywords

  • Single Sign-On
  • SSO Integration
  • Google SSO
  • Brightflag SSO Setup
  • SAML Integration
  • ACS URL
  • NameID Mapping
Was this article helpful?
0 out of 1 found this helpful

Comments

0 comments

Please sign in to leave a comment.

Have more questions?
Submit a request
Share it, if you like it.