Log in with Single Sign-On

Here’s How to Log in to Bionic for Agencies Using your Company’s Identity Provider.

Bionic supports Single Sign-On (SSO), allowing you to log in with your company credentials instead of managing a separate username and password. This improves security, reduces password fatigue, and gives your IT team centralized control over user access.

If your organization has SSO enabled, you’ll be able to use the Use Single Sign-On option on the Bionic login page.

Screenshot of Bionic's log in page.

In this article, we’ll cover:

  1. See the Supported Identity Providers

  2. Get Set Up for SSO

  3. Log In with SSO

NOTE: Your SSO login email must match your Bionic user email exactly. Bionic does not currently support automatic user provisioning through SSO. If the email you use to authenticate through your identity provider doesn’t match your existing Bionic user account, you won’t be able to log in.

It’s common for companies to have multiple variants of employee email addresses (e.g., jsmith@company.com, john.smith@company.com, jsmith@subsidiary.company.com).

Make sure you use the exact email address assigned to your Bionic user.


See the Supported Identity Providers

Bionic supports a wide range of identity providers through our SSO integration. The following IdPs are supported:

  • ADP OpenID Connect

  • Auth0 SAML

  • CAS SAML

  • ClassLink SAML

  • Cloudflare SAML

  • CyberArk SAML

  • Duo SAML

  • Entra ID (Azure AD)

  • Entra ID OpenID Connect

  • Google OpenID Connect

  • Google SAML

  • JumpCloud SAML

  • Keycloak SAML

  • LastPass SAML

  • Login.gov OpenID Connect

  • Microsoft AD FS

  • miniOrange SAML

  • NetIQ SAML

  • Okta

  • Okta OpenID Connect

  • OneLogin

  • Oracle

  • PingFederate

  • PingOne

  • Rippling

  • Salesforce

  • Shibboleth

  • Shibboleth Generic SAML

  • SimpleSAMLphp SAML

  • VMware Workspace One


Get Set Up for SSO

To enable SSO for your organization, your IT administrator will need to configure the connection with Bionic.

  1. Your Org Admin or IT or Security team in Bionic will provide your company’s domain to Bionic Support.

  2. Bionic Support will walk your IT team through connecting your identity provider.

  3. Once set up, all users in your domain can use SSO to access Bionic.

Note: If your organization requires SSO-only login, Bionic can configure this setting so users cannot log in with username and password.

Below are sample screenshots showing what your IT team may see during setup:

IT/Security admin config screen 

 

Sample of step by step instructions. NOTE: This is a screenshot for Okta (other provides may look different).

 

Sample completed and activated connection screen:

 

Successful configuration screen: 

Example of user screen:


 

NOTE: Bionic does not currently support automated user provisioning through SSO. All users must already exist in Bionic with an exact email match to their identity provider account. If a user is missing, an admin must add them manually before they can log in with SSO.


Log In with SSO

Once your organization is enabled for SSO:

  1. Go to the Bionic login page.

  2. Enter your company email address.
  3. Click Use Single Sign-On.

  4. Bionic will check your domain and route you to your company’s identity provider (e.g., Okta, Azure AD, Google).

    1. If you’re already logged into your identity provider in this browser session, you’ll be logged into Bionic automatically.

    2. If you’re not logged in yet, you’ll be prompted to authenticate with your company credentials (your organization may also require MFA).

  5. Once authentication is confirmed by your identity provider, you’ll be logged directly into Bionic. 

Tip: You can also launch Bionic directly from your IdP’s application dashboard (e.g., Okta or Microsoft Entra portal) if your IT team has enabled that option.

SSO availability and pricing may vary based on your organization’s setup. If you're interested in enabling SSO for your organization please reach out to Bionic Customer Support or your CSM to discuss.