DeskDay supports secure Single Sign-On (SSO) using OpenID Connect (OIDC).
You can integrate any identity provider that supports OIDC, including:
Microsoft 365 (Azure Entra ID)
Google Workspace
Okta
JumpCloud
Auth0
And other OIDC-compatible providers
This document explains how to set up SSO in Azure and Google and sync users into DeskDay.
Understanding DeskDay SSO with OIDC
DeskDay uses the OIDC standard for authentication.
To integrate an identity provider, you will need:
Client ID
Client Secret
Issuer URL (well-known OIDC metadata endpoint)
Redirect URL provided by DeskDay
An identity provider that supports OIDC authentication flows
Once configured, DeskDay uses the provider to authenticate users and sync users into the PSA.
Before You Begin
Ensure you have:
Admin access to the identity provider (Azure, Google, Okta, etc.)
Permission to configure an OIDC application
Microsoft 365 (Azure Entra ID) Integration
Step 1: Add a New OIDC SSO Configuration in DeskDay
In the DeskDay Portal → Customers, open the customer account.
Select SSO+
Enter the customer's domain.
Prepare to enter:
Client ID
OpenID Connect metadata document URL
Client Secret
Redirect URLs (from DeskDay)
Step 1: Create an App Registration in Azure Entra
Go to Azure Portal → App registrations.
Click New registration.
Name it (e.g., DeskDay).
Select Supported account types to:
Accounts in this organizational directory onlyRegister the application.
After registration:
Copy the Application (client) ID from the overview page.
Copy the OpenID Connect metadata document
Select Endpoints.
Copy the OpenID Connect metadata document URL
Step 2: Create a Client Secret
Select Add a certificate or secret.
Select New secret.
Choose a name (e.g., DeskDay SSO secret) and expiry period ( 180 days or 365 days).
Copy the Secret Value.
Step 3: Add values to the DeskDay SSO screen
Application (client) ID
OpenID Connect metadata document
Secret Value
Expiry Date
Select Next.
Step 4: Add Redirect URL
Copy the Redirect URL.
2. Go to Azure portal → Authentication → Add a platform → Web.
3. Add the Redirect URI
4. Click Configure to complete the SSO configuration.
Step 5: User Login & Automatic Provisioning
Once the SSO configuration is completed:
End users can log in using their Microsoft 365 credentials through:
DeskDay Web Portal
IT Connect Desktop App
IT Connect Mobile App
IT Connect Microsoft Teams App
No manual user creation is required.
If the user is disabled or removed from Azure, they will lose access to DeskDay.
Google Workspace Integration (OIDC)
Step 1: Set Up the OAuth Consent Screen in Google Cloud
Go to Google Cloud Console.
Select or create a Google Cloud Project.
Navigate to: APIs & Services → OAuth consent screen.
Select Overview → Get started.
Follow the steps and complete. Make sure to select the audience type as "Internal".
Step 2: Create a new OAuth credential
Go to Clients → Create Client.
Select Application type: Web application.
Name it (e.g., DeskDay) and create.
Copy the Client ID and Client Secret.
Step 3: Add values to the DeskDay SSO screen
In the DeskDay Portal → Customers, open the customer account.
Select SSO+
Enter
Domain
Application (client) ID ( copied from Google )
OpenID Connect metadata document (https://accounts.google.com)
Secret Value ( copied from Google )
Click Next
Step 4: Add Redirect URL
Copy the Redirect URL.
Go to Google Cloud Console.
Clients → Select the Credential.
Add the Redirect URL and Save to complete the SSO configuration.
Step 5: User Login & Automatic Provisioning
Once the SSO configuration is completed:
End users can log in using their Google Workspace credentials through:
DeskDay Web Portal
IT Connect Desktop App
IT Connect Mobile App
IT Connect Microsoft Teams App
No manual user creation is required.
If the user is disabled or removed from Google, they will lose access to DeskDay.


















