Skip to main content

Integrate SSO and sync users to DeskDay

Jobin Johny avatar
Written by Jobin Johny
Updated this week

DeskDay supports secure Single Sign-On (SSO) using OpenID Connect (OIDC).
You can integrate any identity provider that supports OIDC, including:

  • Microsoft 365 (Azure Entra ID)

  • Google Workspace

  • Okta

  • JumpCloud

  • Auth0

  • And other OIDC-compatible providers

This document explains how to set up SSO in Azure and Google and sync users into DeskDay.


Understanding DeskDay SSO with OIDC

DeskDay uses the OIDC standard for authentication.
To integrate an identity provider, you will need:

  • Client ID

  • Client Secret

  • Issuer URL (well-known OIDC metadata endpoint)

  • Redirect URL provided by DeskDay

  • An identity provider that supports OIDC authentication flows

Once configured, DeskDay uses the provider to authenticate users and sync users into the PSA.


Before You Begin

Ensure you have:

  • Admin access to the identity provider (Azure, Google, Okta, etc.)

  • Permission to configure an OIDC application


Microsoft 365 (Azure Entra ID) Integration

Step 1: Add a New OIDC SSO Configuration in DeskDay

  1. In the DeskDay Portal → Customers, open the customer account.

  2. Select SSO+

  3. Enter the customer's domain.

Prepare to enter:

  • Client ID

  • OpenID Connect metadata document URL

  • Client Secret

  • Redirect URLs (from DeskDay)

Step 1: Create an App Registration in Azure Entra

  1. Go to Azure Portal → App registrations.

  2. Click New registration.

  3. Name it (e.g., DeskDay).

  4. Select Supported account types to:
    Accounts in this organizational directory only

  5. Register the application.

After registration:

Copy the Application (client) ID from the overview page.

Copy the OpenID Connect metadata document

  1. Select Endpoints.

  2. Copy the OpenID Connect metadata document URL


Step 2: Create a Client Secret

  1. Select Add a certificate or secret.

  2. Select New secret.

  3. Choose a name (e.g., DeskDay SSO secret) and expiry period ( 180 days or 365 days).

  4. Copy the Secret Value.


Step 3: Add values to the DeskDay SSO screen

  1. Application (client) ID

  2. OpenID Connect metadata document

  3. Secret Value

  4. Expiry Date

Select Next.


Step 4: Add Redirect URL

  1. Copy the Redirect URL.

2. Go to Azure portal → Authentication → Add a platform → Web.

3. Add the Redirect URI

4. Click Configure to complete the SSO configuration.


Step 5: User Login & Automatic Provisioning

Once the SSO configuration is completed:

  • End users can log in using their Microsoft 365 credentials through:

    • DeskDay Web Portal

    • IT Connect Desktop App

    • IT Connect Mobile App

    • IT Connect Microsoft Teams App

No manual user creation is required.
If the user is disabled or removed from Azure, they will lose access to DeskDay.


Google Workspace Integration (OIDC)

Step 1: Set Up the OAuth Consent Screen in Google Cloud

  1. Go to Google Cloud Console.

  2. Select or create a Google Cloud Project.

  3. Navigate to: APIs & Services → OAuth consent screen.

  4. Select Overview → Get started.

  5. Follow the steps and complete. Make sure to select the audience type as "Internal".


Step 2: Create a new OAuth credential

  1. Go to Clients → Create Client.

  2. Select Application type: Web application.

  3. Name it (e.g., DeskDay) and create.

  4. Copy the Client ID and Client Secret.


Step 3: Add values to the DeskDay SSO screen

  1. In the DeskDay Portal → Customers, open the customer account.

  2. Select SSO+

Enter

  1. Domain

  2. Application (client) ID ( copied from Google )

  3. OpenID Connect metadata document (https://accounts.google.com)

  4. Secret Value ( copied from Google )

Click Next


Step 4: Add Redirect URL

Copy the Redirect URL.


  1. Go to Google Cloud Console.

  2. Clients Select the Credential.

  3. Add the Redirect URL and Save to complete the SSO configuration.


    Step 5: User Login & Automatic Provisioning

    Once the SSO configuration is completed:

    • End users can log in using their Google Workspace credentials through:

      • DeskDay Web Portal

      • IT Connect Desktop App

      • IT Connect Mobile App

      • IT Connect Microsoft Teams App

    No manual user creation is required.
    If the user is disabled or removed from Google, they will lose access to DeskDay.

Did this answer your question?