Skip to content

Single Sign-On setup guide for clients

This guide explains how to configure your identity provider (IdP) so you can use Single Sign-On (SSO) and automatic user provisioning on your Dealer Studio platform. Setup has two main parts:

  • SCIM user provisioning — Creates and updates user accounts automatically.
  • SAML Single Sign-On — Lets users sign in with corporate credentials.

Before you start, make sure you have:

  • Administrative access to your identity provider (Microsoft Entra ID, Okta, Google Workspace, and so on).
  • The Dealer Studio subdomain for your organisation (for example https://yourcompany.dealerstudio.com).
  • A clear list of who should have manager versus regular (staff) access.

  1. Create a new SCIM (or “enterprise application” with provisioning) in your IdP.

  2. Set the SCIM base URL to:

    https://yourcompany.dealerstudio.com/scim/

    (Use your real subdomain instead of yourcompany.)

  3. Set authentication to Bearer token.

  4. Use the SCIM bearer token supplied by your Dealer Studio administrator.

Create two groups in your IdP per dealership location you want to sync.

TypePurposeNaming conventionExample
ManagersAdministrative access to manage the dealershipDS_[DealershipName]_ManagersDS_Melbourne_Toyota_Managers
StaffStandard user accessDS_[DealershipName]_StaffDS_Melbourne_Toyota_Staff

Provisioning must send the attributes below. Exact field names can vary by IdP; map them to the SCIM paths shown.

Attribute (SCIM)RequiredFormatExample
emails[0].valueYesEmail addressjohn.smith@yourcompany.com
name.formattedYesFull nameJohn Smith
name.givenNameYesFirst nameJohn
name.familyNameYesLast nameSmith
groupsYesGroup identifiers (see below)IdP-specific UUIDs or IDs

Step 4: Group membership in the SCIM payload

Section titled “Step 4: Group membership in the SCIM payload”

Your IdP must send group information in a shape Dealer Studio can read. Supported patterns include:

Format 1 — Array of groups (recommended)

{
"groups": [{ "value": "uuid-for-manager-group" }, { "value": "uuid-for-staff-group" }]
}

Format 2 — Groups with members

{
"groups": {
"members": [{ "value": "uuid-for-manager-group" }]
}
}

Step 1: Details to request from Dealer Studio

Section titled “Step 1: Details to request from Dealer Studio”

Ask your Dealer Studio administrator for:

ItemNotes
Entity ID / IssuerYour tenant’s SAML entity identifier (often tied to your subdomain or IdP record).
ACS URLhttps://yourcompany.dealerstudio.com/users/auth/saml/callback?identity_provider_id=[ID] — replace [ID] with the numeric identity provider id you are given.
Single Logout (SLO) URLhttps://yourcompany.dealerstudio.com/auth/saml/[ID]/logout — same [ID] as above.

Sign-in links used in the product may also look like:

https://yourcompany.dealerstudio.com/users/auth/saml?identity_provider_id=[ID]

Step 2: Configure the SAML application in your IdP

Section titled “Step 2: Configure the SAML application in your IdP”
  1. Create a SAML 2.0 application (or enterprise app) for Dealer Studio.
  2. Set the Entity ID / Audience and ACS (Reply) URL to the values provided.
  3. Set Name ID format to: urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
  4. Set the Name ID value to the user’s email address.

The assertion should carry the user’s email in a way your integration expects. Common options:

  • Primary: auth.info.email (Ruby/OmniAuth-style naming in some docs — map to your IdP’s “email” or “Name ID” as instructed by Dealer Studio).
  • Alternative claim URI: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress

Follow the attribute mapping your Dealer Studio administrator confirms for your IdP.

Step 4: Certificate and endpoints to provide

Section titled “Step 4: Certificate and endpoints to provide”

Export and send to your Dealer Studio administrator:

  • SAML signing certificate (X.509, PEM or as required).
  • Certificate fingerprint (SHA-1 or SHA-256, as requested).
  • SSO URL — where Dealer Studio should send users to authenticate at your IdP.
  • SLO URL — single logout at your IdP, if you support it.

If your IdP does not expose an SLO endpoint, Dealer Studio can fall back to a normal local sign-out after SAML login.


Use the stable group identifier your IdP exposes (this is what you put in SCIM groups and what Dealer Studio maps to manager/staff per dealership):

IdPWhere to find the ID
Microsoft Entra ID (Azure AD)Group Object ID in group properties
OktaGroup ID in group settings
Google WorkspaceGroup email or unique group id (as agreed with Dealer Studio)

Example mapping table for your administrator

Section titled “Example mapping table for your administrator”
DealershipManager group UUIDStaff group UUID
Melbourne Toyotaa1b2c3d4-…e5f6a7b8-…
Sydney Hondac9d0e1f2-…a3b4c5d6-…

Microsoft Entra ID

Group nameObject ID
DS_Melbourne_Toyota_Managersa1b2c3d4-e5f6-7890-abcd-ef1234567890
DS_Melbourne_Toyota_Staffe5f6a7b8-c9d0-1234-5678-90abcdef1234

Okta

Group nameGroup ID
DS_Melbourne_Toyota_Managers00g1ab2cd3ef4gh5i678
DS_Melbourne_Toyota_Staff00g9ij8kl7mn6op5q432

  • Manager access — User is a member of the manager group mapped for a dealership.
  • Staff access — User is a member of the staff group mapped for that dealership.
  • No access — User is not in any mapped group for that dealership.

Users can have different roles per dealership, for example:

  • Manager at Dealership A and staff at Dealership B.
  • Manager at more than one dealership.
  • Staff at more than one dealership.

Same user in manager and staff for one dealership

Section titled “Same user in manager and staff for one dealership”

If both groups apply to the same dealership, manager access takes precedence over staff.


  1. Create a test user in your IdP.
  2. Add them to a staff group for one dealership and run a provision cycle.
  3. Confirm the user appears in Dealer Studio with the expected dealership access.
  4. Add them to a manager group and confirm the role upgrades.
  5. Remove group membership and confirm access is removed or downgraded as expected.
  1. Open your subdomain, for example https://yourcompany.dealerstudio.com.
  2. Use Sign in with SSO (or the direct SAML URL your administrator gave you).
  3. Confirm sign-in succeeds and you reach the dashboard.
  4. Test single logout from Dealer Studio and from the IdP, if SLO is configured.

SCIM

  • App type: Non-gallery (or custom enterprise application).
  • Provisioning mode: Automatic.
  • Tenant URL: https://yourcompany.dealerstudio.com/scim/
  • Secret token: supplied by Dealer Studio.

SAML

  • Identifier (Entity ID): value from Dealer Studio.
  • Reply URL (ACS): ACS URL from Dealer Studio (includes identity_provider_id).
  • Sign-on URL (optional / IdP-initiated): often https://yourcompany.dealerstudio.com/users/auth/saml (with identity_provider_id query parameter if you use multiple IdPs).

SCIM

  • Create an app integration; enable SCIM provisioning where applicable.
  • SCIM connector base URL: https://yourcompany.dealerstudio.com/scim/
  • Token: from Dealer Studio.

SAML

  • Single sign-on URL: your IdP SSO URL (not the ACS — the ACS is on Dealer Studio).
  • Audience URI: Entity ID from Dealer Studio.
  • Default RelayState: leave empty unless Dealer Studio specifies a value.
  • Name ID format: EmailAddress.

SCIM

  • Admin console → AppsWeb and mobile apps → add or configure your SAML/SSO app with automated provisioning where available.
  • SCIM endpoint: https://yourcompany.dealerstudio.com/scim/

SAML

  • ACS URL and Entity ID: values from Dealer Studio.
  • Name ID: primary email.
  • Name ID format: EMAIL (or equivalent).

  • Confirm the user exists in Dealer Studio (usually provisioned via SCIM first).
  • Check the email used in SAML matches the provisioned user.
  • Confirm the IdP signing certificate is valid and not expired.
  • Check group membership in the IdP.
  • Confirm group IDs are mapped correctly in Dealer Studio for each dealership.
  • Inspect SCIM payloads or IdP provisioning logs to ensure groups is present and correct.
  • Review group membership in the IdP.
  • Remember manager overrides staff for the same dealership.
  • Re-check the group UUID mapping with your administrator.

Collect and send to your Dealer Studio administrator:

  • Affected user’s email.
  • Current group memberships in the IdP.
  • Relevant errors from IdP sign-in or SCIM provisioning logs.

SCIM

  • Use a strong, unique bearer token; store it only in the IdP secret store.
  • Rotate tokens on a schedule (for example quarterly).
  • Monitor provisioning success and failure logs.
  • Audit group membership regularly.

SAML

  • Use strong keys on signing certificates (for example 2048-bit RSA minimum).
  • Track certificate expiry and renew before cut-off.
  • Keep assertion signing and HTTPS enforced end-to-end.

Access management

  • Review manager memberships on a fixed cadence.
  • Remove IdP groups (or deactivate users) promptly when people leave.
  • Default new users to staff unless they need manager capabilities.

  • SCIM app configured with base URL https://yourcompany.dealerstudio.com/scim/ and bearer token.
  • Manager and staff groups created per dealership; naming is consistent and documented.
  • Group identifiers sent to Dealer Studio for mapping.
  • SAML app configured with correct Entity ID, ACS URL, Name ID = email, and certificate details exchanged.
  • Test users verified through SCIM and SAML.
  • Production users assigned to the correct groups.
  • Ongoing monitoring and access reviews agreed with your team.

When this is complete, users can access Dealer Studio with corporate credentials, with accounts kept in sync and dealership permissions driven by group membership.