Table of Contents
Authentication, SSO, & SCIM - Start Here
Use this hub to understand how authentication works in LinearB, choose your SSO provider, configure SCIM provisioning (Okta only), and manage or disable identity integrations. This page links to all…
Use this hub to understand how authentication works in LinearB, choose your SSO provider, configure SCIM provisioning (Okta only), and manage or disable identity integrations. This page links to all configuration guides.
Note: SSO and SCIM are not enabled by default. Please contact LinearB Support to enable these features for your organization.
Overview
LinearB supports:
- SAML 2.0 SSO with:
- Okta
- Google Workspace (GSuite)
- Azure AD / Microsoft Entra
- OneLogin
- Ping Identity
- SCIM Provisioning (Okta only)
SSO centralizes authentication and improves security. SCIM automates user lifecycle (create, update, deactivate).
Where to configure:
All authentication settings live under Settings → SSO
Who can configure:
LinearB Admins only.
General SAML 2.0 Integration
LinearB can integrate with any SAML 2.0-compliant identity provider (IdP). Use this guide if your IdP is not listed above or you prefer a generic setup.
Key terms
- IdP: Identity Provider (your SSO system)
- SP: Service Provider (LinearB)
Step 1: Enable SAML SSO in LinearB
- In LinearB, go to Settings → SSO.
- Open the Single Sign-On section/tab.
- Click Set Up SSO (or equivalent) to generate the SSO configuration.
Step 2: Create a SAML 2.0 application in your IdP
Your IdP admin will need these SAML values:
- ACS URL / Callback URL: generated in LinearB during setup (copy it from the SSO screen)
- Entity ID / Audience:
https://app.linearb.io/login - Name ID format: email
- Required attributes: none (Name ID is sufficient)
Important: Assign at least one user to the LinearB SSO app in your IdP before testing.
Step 3: Copy IdP values into LinearB
Back in LinearB, fill in the fields using values from your IdP:
- Provider Single Sign-On URL (sometimes labeled SSO URL)
- Provider Issuer (Issuer URL or IdP Entity ID)
- Organization Email Domain (for example,
example.com) - X.509 Certificate (paste the full certificate)
Step 4: Test the connection
- Click Save to trigger a test login flow.
- If successful, the SAML Authentication toggle should show as enabled/connected.
Optional: Username attribute mapping (IdP-specific)
Some IdPs let you send a custom attribute (often called userName) to control the username
created in LinearB. If you do not map a username attribute, LinearB will typically use the user’s email.
Provider Specific SSO Setup
Provider Specific SSO Setup Guides
- Configuring SAML SSO with Okta
- Configuring SAML SSO with Google Workspace
- Configuring SAML SSO with Microsoft Entra (formerly Azure AD)
Each provider guide includes steps for:
- Setting up a SAML application
- Configuring the Entity ID & ACS URL
- Adding the X.509 certificate
- Assigning users
- Testing & enforcing SSO
SCIM Provisioning
What SCIM does
- Automatically provisions new LinearB users
- Updates user profile attributes
- Deactivates LinearB users when deactivated in Okta
- Keeps identity data centralized and consistent
Guide:
Note: SCIM is supported only with Okta. Microsoft Entra and Google do not support SCIM provisioning for LinearB.
Enforcing SSO
You can require all users to authenticate through your identity provider.
Steps:
- Go to Settings → Authentication / SSO.
- Enable the toggle “Require SSO for all users”.
- Save your settings.
After enforcement:
- Users must sign in via your SSO provider only.
- Email/password login will be disabled.
- New users must be added via your IdP (or SCIM, if using Okta).
Disabling SSO
How to Disable SSO
When would you disable SSO?
- Changing identity providers
- Testing a new SSO configuration
- Restoring access for users locked out of the IdP
Steps to disable SSO:
- Go to Settings → SSO.
- Turn off the SAML Authentication toggle.
- If enforced, uncheck the Require SSO option.
- Save your settings.
Result: Users can again log in with email + password, and SSO logins will no longer be required.
Disabling SCIM
How to Disable SCIM Provisioning (Okta)
When would you disable SCIM?
- Switching identity providers
- Stopping automated user lifecycle management
- Debugging unexpected provisioning changes
Steps in Okta:
- Open the LinearB Okta application.
- Go to the Provisioning tab.
- Under Integration, click Edit.
- Disable API Integration.
- Save your settings.
Steps in LinearB:
- Go to Settings → SCIM .
- Revoke the SCIM token (optional but recommended).
Result: Okta will no longer create, update, or deactivate LinearB users via SCIM. Existing LinearB users remain unchanged.
FAQs
Can I configure SSO with multiple providers?
No — LinearB supports one SAML SSO provider at a time.
Do new SSO users get a default role?
Yes, new users created through SSO or SCIM begin as Viewer.
Does disabling SSO remove user accounts?
No — it only changes how users authenticate.
Does SCIM assign users to Teams?
No — team membership is managed inside LinearB.
Next steps:
How did we do?
Setup Guide - Google Workspace (GSuite) SAML SSO