Setting Up Single Sign-On (SSO/SAML) in FileInvite

Learn how to configure organization-level Single Sign-On (SSO) using SAML 2.0 authentication. This allows all members within your organization to access FileInvite through your identity provider.

If your Fileinvite Login URL ends in fileinvite.com, please use this knowledge base instead.

Overview

FileInvite supports SAML 2.0-based Single Sign-On, enabling you to manage user authentication through your existing identity provider (such as Okta, Azure AD, or Google Workspace). When SSO is enabled, it applies to all members within your organization.

Key Benefits:

  • Centralized user authentication through your identity provider
  • Improved security with your organization's authentication policies
  • Simplified user management and access control
  • Reduced password fatigue for team members

Getting Started

Before configuring SSO, you'll need:

  • Administrative access to FileInvite's Organization Settings
  • Administrative access to your identity provider (IdP)
  • Ability to manage your organization's DNS records

Note: SSO configuration is available only to the organization owner. Navigate to Settings > Advanced Settings> SSO/SAML to access the configuration page.


What You'll Need to Configure Single Sign-On

FileInvite provides the following information that you'll need to enter into your identity provider:

Screenshot 2025-12-08 120204


Note: These URLs are unique to your organization and can be copied directly from the SSO/SAML configuration page using the copy icons next to each field.


Configuration Methods

You can configure SSO using either of two methods:

Method 1: Upload Metadata File (Recommended)

Screenshot 2025-12-08 115914

The fastest way to configure SSO is by uploading your identity provider's metadata XML file:

  1. Navigate to Settings > Organisation Settings > SSO/SAML
  2. Under What we need from you, locate the Upload metadata file section
  3. Click click to upload or drag and drop your identity provider's .xml metadata file
  4. FileInvite automatically extracts and populates the required fields
  5. Click Save Changes

Note: The metadata file contains all necessary configuration information, including Entity ID, Certificate, Login URL, and Logout URL.


Method 2: Manual Configuration

Screenshot 2025-12-08 115919

If you prefer to enter details manually or don't have a metadata file:

  1. Navigate to Settings > Organisation Settings > SSO/SAML
  2. Scroll to Or manually enter the details below
  3. Enter the following information from your identity provider:
    1. Entity ID: The unique identifier for your identity provider (provided by your IdP)
    2. Certificate (Base64): The X.509 certificate from your identity provider in Base64 format. Paste the entire certificate including the BEGIN and END lines.
    3. Login URL: The SAML 2.0 endpoint where FileInvite sends authentication requests
    4. Logout URL: The endpoint for single logout (SLO) functionality

4. Click Save Changes

 


DNS Configuration Requirements

Important: Custom domain and SSO setup must be configured together. This is a standard approach for FileInvite customers and both features use the same configuration interface.

To complete SSO setup with a custom domain, two DNS entries are required:

1. AWS Certificate Manager Record

This record allows FileInvite to issue SSL certificates on your organization's behalf:

  • Purpose: Provides security authorization for certificate issuance
  • Type: CNAME record (provided during setup)
  • Management: Add this record to your organization's DNS settings

2. CNAME Record to CloudFront Distribution

This record redirects your custom domain traffic to FileInvite's infrastructure:

  • Purpose: Routes traffic through FileInvite's content delivery network (CDN)
  • Type: CNAME record (provided during setup)
  • Function: Distributes the FileInvite interface to your users

Both DNS records must be in place before SSO and custom domain functionality will work. FileInvite will provide the specific values for these records during the configuration process.


Certificate Management

Automatic Certificate Handling

Once your DNS records are in place, AWS Certificate Manager handles SSL certificates automatically:

  • No manual renewals required: Certificates renew automatically before expiration
  • Prevents outages: Eliminates downtime from expired certificates
  • Zero maintenance: No customer action needed for ongoing certificate management

Previous manual certificate processes often caused outages due to expired certificates. The automated AWS approach eliminates this risk.

 

Your Organization Retains Control

You maintain full control over FileInvite's certificate authority:

  • Remove access anytime: Delete the AWS Certificate Manager DNS record to immediately revoke FileInvite's certificate authority
  • Immediate effect: Removal causes an immediate outage (HTTPS connections will fail)
  • Complete control: You determine when and how FileInvite can issue certificates for your domain

Enabling SSO

After completing the configuration:

  1. Verify all information is correct
  2. Click Enable SSO button in the top-right corner of the SSO/SAML page
  3. Test the SSO login flow with your own account before rolling out to all users
  4. Communicate the change to your team members

Important: Once SSO is enabled, all organization members must authenticate through your identity provider. Standard username/password login will no longer be available for SSO-enabled users.


Testing Your SSO Configuration

Before enabling SSO for all users:

  1. Test with a single account: Use your own account or a test user account
  2. Verify the login flow:
    • Navigate to your FileInvite login page
    • Click the SSO login option
    • Confirm you're redirected to your identity provider
    • Complete authentication
    • Verify successful return to FileInvite
  3. Test logout: Confirm single logout works correctly
  4. Verify user attributes: Check that user information (name, email) is correctly passed from your IdP

Troubleshooting

Common Issues

SSO login fails with "Authentication Error"

  • Verify the Entity ID and URLs match exactly between FileInvite and your identity provider
  • Check that your certificate is in the correct Base64 format
  • Ensure the certificate hasn't expired

Users aren't redirected to the identity provider

  • Confirm SSO is enabled in FileInvite
  • Verify your identity provider application is active
  • Check that the Start/Login URL is correctly configured in your IdP

Custom domain doesn't work with SSO

  • Verify both DNS records (AWS Certificate Manager and CloudFront CNAME) are in place
  • Allow up to 48 hours for DNS propagation
  • Confirm DNS records point to the correct values provided by FileInvite

Certificate errors when accessing the portal

  • Check that the AWS Certificate Manager DNS record is active
  • Verify SSL certificate has been issued (may take up to 30 minutes after DNS records are added)
  • Clear browser cache and try again

Security Best Practices

💡 Best Practices:

  • Use metadata file upload when possible: This reduces manual entry errors and speeds up configuration
  • Test thoroughly before full rollout: Verify SSO works correctly with test accounts before enabling for all users
  • Monitor certificate expiration: While AWS handles renewals automatically, periodically verify your DNS records remain in place
  • Document your configuration: Keep records of your SSO settings and DNS entries for future reference
  • Coordinate with your IT team: Ensure both FileInvite and identity provider administrators are involved in setup
  • Plan for DNS propagation time: Allow up to 48 hours for DNS changes to fully propagate when setting up custom domains

Important Notes

SSO Applies Organization-Wide: When SSO is enabled, it applies to all members within your organization. Individual users cannot opt out of SSO authentication.

Custom Domain Integration: SSO configuration and custom domain setup must be completed together in the current system architecture. You cannot configure these features separately.

DNS Record Maintenance: Keep your AWS Certificate Manager and CloudFront CNAME records active in your DNS settings. Removing these records will immediately cause an outage for SSO and custom domain access.

Regional URLs: The URLs shown in this article use the US region (us.fileinvite.app). If your organization is in the Australia region, your URLs will use au.fileinvite.app instead.


🎉 Success! Your organization's Single Sign-On is now configured. Team members can access FileInvite using your organization's identity provider credentials. 🎉


Need Help?

If you encounter issues during SSO configuration or need assistance with DNS setup, contact your FileInvite account manager or support team for guidance.