CyberDefenders offers Single Sign-On (SSO) functionality for Business Plan team leaders, making it easier to manage and secure how your organization's members sign in. We support integration with multiple Identity Providers (IdPs). Follow the steps below to configure and activate SSO foryour account and users.
Step 1 - Configure your Identity Provider
To connect your Identity Provider (IdP) with the CyberDefenders platform, follow the appropriate setup guide below:
• Entra ID (Azure AD)
• Google Workspace
• Okta
If your IdP isn't listed, please contact us through the Intercom chat on our website.
Configure SSO with Entra ID (Azure AD):
1. Give consent to the CyberDefenders app
Ask your Azure Active Directory Admin to grant consent to the CyberDefenders app by visiting the following URL:
https://login.microsoftonline.com/<TENANT_ID>/adminconsent?client_id=7e8bc8c5-9e3d-49ea-ac90-1b9d1714e688/
Replace <TENANT_ID>
with your organization's Tenant ID. Which can be found on MicroSoft Entra ID Overview Page.
2. Add users to the app
Once consent is granted, the CyberDefenders app will appear in the Enterprise Applications list.
To grant access to specific users:
Select the CyberDefenders app from the list.
Click Assign users and groups.
Add the users and groups who should have access.
Configure SSO with Google Workspace
Google Workspace requires no setup to enable SSO with CyberDefenders — it works out of the box.
[Optional] Manage User Access
To restrict or manage access to the CyberDefenders application within your organization, follow these steps:
Workspace admins can navigate to: Google Admin Console > Security > API Controls > App Access Control, and click Configure new app.
In the Configure new app screen, search for CyberDefenders using this Client ID:
491519024942-ksc4ee4hvejpmrvget6kegdpg8kjc73i.apps.googleusercontent.com
Select CyberDefenders from the results.
At the Scope step, define which users or groups should have access. Click Continue.
In the Access to Google Data step:
Select the Specific Google Data option.
Ensure the following Google Sign-in scopes are enabled:
openid
email
profile
Click Continue.
On the Preview step, verify your settings and click Finish.
Configure SSO with Okta
1. Add the CyberDefenders app
To set up SSO with Okta:
Go to the Applications section in your Okta dashboard.
Click Browse App Catalog
Search for CyberDefenders, select it, and click Add Integration.
2. Gather Required Integration Data
After adding the app, you'll need to collect the following details and send them to us:
Client ID and Client Secret: Navigate to the app's Sign On tab and copy these values.
API URL (Issuer): On the same page, locate the OpenID Provider Metadata section. Click the metadata URL and extract the issuer value from the JSON response.
3. Assign Users
To grant access:
Open the app page in Okta.
Go to the Assignments tab.
Add the users and groups who should have access.
Step 2 - Request access
To complete the SSO setup, please share the following information with our Support team through Intercom chat on our website.
Required Information:
Identity Provider: Specify whether you're using Azure AD, Google Workspace, or Okta.
Organization Domain: Your organization's primary domain name.
Identity Provider Data (only required for Okta):
Client ID
Client Secret
API URL (Issuer)