Documentation

Single Sign-On (SSO)

Configure SAML 2.0 SSO with your identity provider to enable seamless authentication for your team.

Single sign-on allows your team to authenticate with DocQ using their existing corporate credentials, eliminating the need for separate passwords. DocQ supports SAML 2.0, the industry-standard protocol for federated identity.

Info

SSO is a paid feature that is only enabled for your organization if you have subscribed to it. Contact your account manager or DocQ support to enable SSO.

How SSO Works

DocQ matches users between your identity provider and DocQ using email addresses. When a user authenticates through your IdP, DocQ looks up the matching email address in its user database and grants access accordingly.

Warning

SSO does not automatically create user accounts. Every user who needs to access DocQ must also be created in DocQ with a matching email address. Access permissions are still managed within DocQ regardless of SSO enablement.

Key Terminology

TermDescription
Identity Provider (IdP)The service that manages user accounts and verifies identities (e.g., Okta, Azure AD).
Service Provider (SP)The software requesting user information — in this case, DocQ.
AssertionA statement from the IdP containing verified user information.
EntityIDA globally unique identifier for the IdP or SP.
NameIDThe unique user identifier at the IdP. For DocQ, this must be the user's email address.
MetadataAn XML document describing the configuration of the IdP or SP.
CertificateUsed to verify the digital signatures on assertions.
ACS URLAssertion Consumer Service URL — the endpoint where DocQ accepts assertions from the IdP.
RelayStateOptional state information used to verify the request.

Supported Identity Providers

DocQ supports any SAML 2.0 compatible identity provider, including:

  • Google Workspaces
  • Okta
  • Auth0
  • Microsoft Active Directory
  • Azure AD
  • Microsoft Entra
  • PingIdentity
  • OneLogin

Generic SAML 2.0 Configuration

IdP Configuration

Configure the following values in your identity provider:

SettingValue
EntityIDhttps://auth.docq.app/auth/v1/sso/saml/metadata
Metadata URLhttps://auth.docq.app/auth/v1/sso/saml/metadata
Metadata Downloadhttps://auth.docq.app/auth/v1/sso/saml/metadata?download=true
ACS URLhttps://auth.docq.app/auth/v1/sso/saml/acs
NameID FormatemailAddress

DocQ Configuration

After configuring your identity provider, share the following information with the DocQ support team:

  1. IdP Metadata — either a publicly accessible metadata URL or the downloaded XML file.
  2. Domain list — the email domains that should be routed through SSO.

Info

For security, share credentials and metadata through the secure secrets service at secrets.ndmglobal.com.

Okta Setup Guide

This section provides step-by-step instructions for configuring SSO with Okta. If you use a different identity provider, refer to the generic configuration above and your IdP's documentation.

Step 1: Create an App Integration

Navigate to the Okta Applications dashboard and click Create App Integration.

Step 2: Select SAML 2.0

In the app integration dialog, choose SAML 2.0 as the sign-in method.

Step 3: General Settings

Enter a name and description for the application (e.g., "DocQ" and "DocQ Document Automation Platform").

Step 4: SAML Settings

Configure the SAML settings with the following values:

SettingValue
Single Sign-on URLhttps://auth.docq.app/auth/v1/sso/saml/acs
Use this for Recipient URL and Destination URLChecked
Audience URI (SP Entity ID)https://auth.docq.app/auth/v1/sso/saml/metadata
Name ID FormatEmailAddress
Application UsernameEmail

Step 5: Attribute Statements

Add the following attribute statement:

NameValue
emailuser.email

Step 6: Obtain Metadata

  1. In the SAML Signing Certificates section, locate the active SHA-2 certificate.
  2. Click Actions and select View IdP Metadata to open the metadata URL.
  3. Copy the metadata URL or download the XML file.

Your metadata URL will typically follow this format:

https://<your-okta-org>.okta.com/apps/<app-id>/sso/saml/metadata

Share the metadata URL (or XML file) along with your domain information with DocQ support via secrets.ndmglobal.com.

Completing Setup

After you provide the IdP metadata and domain list, the DocQ support team will complete the configuration on the DocQ side. This process typically takes 2 to 3 business days.

Once SSO is enabled:

  • Users with matching email domains will see a dedicated SSO login button on the DocQ login page.
  • Authentication is handled entirely by your identity provider.
  • Users no longer need to manage a separate DocQ password.

Important Notes

  • No Single Logout (SLO) — DocQ does not currently support SAML Single Logout. Users must log out of DocQ and their IdP separately.
  • Metadata accessibility — Your IdP metadata URL must be accessible from the internet for DocQ to validate assertions.
  • Multiple IP addresses — DocQ may connect to your IdP from multiple IP addresses during authentication. Do not restrict access to a single IP.
  • Domain restrictions — Only email addresses matching the specified domains will be allowed to authenticate via SSO. This prevents unauthorized access from non-matching email addresses.

Next Steps