Settings → SSO & Security
Security

SSO & Security

Configure enterprise authentication, enforce multi-factor authentication, automate user provisioning, and audit workspace activity.

Owner-only settings. SSO and Security configuration is restricted to Workspace Owners. Admins cannot access these settings. Before enabling SSO enforcement, verify the configuration works — incorrectly configured SSO can lock users out.


OIDC (OpenID Connect) SSO

OIDC is the recommended SSO method for most identity providers (Okta, Azure AD, Google Workspace, Auth0, and others). When OIDC is configured, users can sign in with their identity provider credentials.

1
In your IdP
Create an OIDC application

Create a new OIDC application. Note the Client ID and Client Secret. Set the redirect URI to: https://[your-domain]/api/auth/sso/callback

2
In Kansov
Enter OIDC configuration

Go to Settings → SSO & Security → Configure SSO. Select OIDC. Enter the Client ID, Client Secret, and Discovery URL.

3
In Kansov
Test and enforce

Click Test SSO to verify the configuration works. Then toggle Enforce SSO to require SSO for all workspace members.


SAML 2.0 SSO

Use SAML for IdPs that prefer it. Kansov supports SP-initiated SAML 2.0 with signed assertions. Configuration follows the same pattern as OIDC — enter your IdP metadata URL or upload the XML metadata file.


SCIM User Provisioning

SCIM automates user lifecycle management — users are created, updated, and deprovisioned in Kansov automatically when they're added or removed in your IdP.

OperationWhat it does in Kansov
Create userCreates a new workspace member when a user is assigned in the IdP
Update userUpdates name, email when changed in the IdP
Deactivate userImmediately revokes workspace access when deprovisioned
Group mappingIdP groups can be mapped to Kansov roles

Multi-Factor Authentication (MFA)

Go to Settings → Workspace → Require MFA and toggle it on. All users who haven't enrolled in MFA will be prompted at their next login.


Audit Logs

Security-relevant actions are logged and available at Settings → SSO & Security → Audit Logs. Logs are retained for 90 days and include logins, team changes, settings changes, and admin actions.