Welcome to our Help Center - home.title

Single Sign-On (SSO) with Supportbench

Overview

Single Sign-On (SSO) enables users to access multiple applications with one set of credentials. In Supportbench, SSO simplifies login, enhances security, and supports enterprise authentication setups (e.g., via Microsoft Entra ID).

Supported Login Methods

On the SB login page (Login into Supportbench) you’ll see three clear methods:

  • Standard Email + Password entry.

  • Sign in with Microsoft — Redirect to Microsoft’s authentication flow. 

  • Sign in with Google — Redirect to Google’s authentication flow. 

Why Use SSO?

  • Fewer credentials for users to remember → lower support effort.

  • Improved security, especially when used with enterprise identity features (MFA, conditional access).

  • Centralised user lifecycle management if tied to your identity provider (e.g., Microsoft Entra).

  • Faster user onboarding/offboarding because you manage access in your ID-system rather than manually in SB.

How it Works – Microsoft SSO Flow

Below is a typical flow when your organisation uses Microsoft and wants to use SB with SSO:

  1. On the SB login page the user clicks Sign in with Microsoft.

  2. SB redirects to Microsoft’s authentication page (via your Azure/Entra tenant).

  3. User enters their Microsoft / Azure AD credentials and passes MFA if required.

  4. Microsoft issues a token back to SB verifying user identity and (optionally) group membership or roles.

  5. SB evaluates the token, matches the user to the SB account (or auto-provisions if enabled) and grants access.

  6. User is redirected into their SB dashboard.

Best Practices for Using SSO in SB

  • Enforce Multi-Factor Authentication (MFA) in your identity provider - SB supports the downstream benefit of that.

  • Regularly audit who has access to SB, and whether the SSO integration is mapping correctly to current roles/groups.

  • De-provision promptly: when a user leaves your organisation, disable their account in your ID system and access to SB should automatically cut off.

  • Monitor login success/failure metrics in SB and in your identity provider for unusual patterns (failed SSO logins, account lockouts).

  • Keep the SB system of record for which users are assigned SB-roles, but ensure assignment flows are aligned with your identity source.

Common Troubleshooting Tips

  • Issue: “Sign in with Microsoft” fails or asks again for credentials repeatedly → check that the redirect URI configured in Azure matches exactly what SB expects, and that the application is set to allow the proper account types.

  • Issue: User logs in via Microsoft but gets a “no access” or “account not found” message in SB → ensure the Microsoft account’s email claim matches an existing SB account, or update provisioning settings in SB to allow auto-creation.

  • Issue: Legacy password logins still allowed even though you prefer SSO only → in SB admin settings you should disable standard username/password login if you want to mandate SSO.

  • Issue: Users from multiple companies / tenants → SB’s multi-tenant login (“Select company” prompt) may require you to map the correct tenant and company within SB so users land in the correct SB instance. support.supportbench.net

Summary

Enabling SSO for Supportbench provides ease-of-use for end users, stronger security when coupled with enterprise identity controls, and centralised administration of access. When properly configured, the “Sign in with Microsoft” (or Google) experience becomes seamless — users click once and they’re in, while admins retain control in their identity platform.

  • SB-roles, but ensure assignment flows are aligned with your identity source.

Was this article helpful?

Yes No

Thank you for your feedback!

×
Select company

You are related to multiple companies. Please select the company you wish to login as.