Single sign-on feature (hereafter SSO) provides security at scale by eliminating user passwords, controlling access and managing login credentials by using your company’s IdP via both SAML 2.0 and OAuth 2.0 (OIDC) (Office 365, Okta, Azure, Active Directory, Google, OneLogin…).
This is a paid feature, which you can enable by upgrading your workspace to Enterprise plan.
In order to use SSO, you first need to move your workspace to subdomain. Once you do that, you can configure SSO settings and disable other login methods.
Before you can configure and start using SSO for authorization, you need to move your Clockify app domain to a custom subdomain.
When you upgrade your Clockify subscription to Enterprise plan, you will get Authentication tab in the Workspacesettings. There, you can enter the subdomain you’d like to use and move your workspace there.
After you create your subdomain, you’ll automatically be logged out of any apps you were logged in with your Clockify account. You’ll have access to them only through the subdomain you created (e.g. https://yourcompanysubdomain.clockify.me/login).
Subdomain is tied to only one workspace. Users on subdomain can’t have multiple workspaces: there is no workspace switcher, no workspaces in the sidebar, and no access to subdomain workspace from the main domain.
To access multiple workspaces, log in to the main Clockify domain.
For security reasons, each user on subdomain gets a separate API key that works only for that workspace – meaning, no one can access your data on your subdomain unless they have the right authorization.
If, for example, there is a user with two separate Enterprise workspaces, workspace owners can’t see, or access data from each others accounts.
Once you’re in the subdomain workspace, you can invite users one by one using email (like before), or let anyone join without you having to manually invite them.
To let anyone join, check the Users can join without an invite checkbox.
If you use SSO and someone without an account tries to log in, the account will be automatically created for them and they’ll log in.
If you allow Log in with email, people will be able to create an account and automatically join your workspace.
If you’d like to use SSO via your mobile devices (android or iOS) all the SSO configurations supported by Clockify should contain [yourcompany subdomain].clockify.me links. For example, in the Redirect URL section add https://yourcompanysubdomain.clockify.me/login/android/oauth2 or https://yourcompanysubdomain.clockify.me/login/ios/oauth2 link.
Clockify supports all major SSO identity providers:
Only workspace owner can see Authorization tab, manage subdomain, configure SSO, and turn SSO on/off.
If you wish to force everyone to log in with SSO, simply turn off the Log in with email option. Once this change has been saved, your workspace members accounts will be required to use SSO to log in.
Data in the SSO configuration can always be edited or deleted. If deleted, your users will have to switch back to logging in by using email or email password.
Owner can always log in using the original credentials at https://mysubdomain.clockify.me/login-owner
To add Default Relay State, use the parameters below.
Make sure to use curly brackets and straight quotes instead of the curly ones, otherwise it won’t work.
In General Settings form, enter the following information and click Next
App name: e.g. Clockify
Logo: e.g. upload Clockify logo
In Configure SAML form, enter the following information:
Single sign on URL (or ACS): Specific URL that SAML assertions from Okta should be sent to (e.g. https://global.api.clockify.me/auth/saml2)
Audience URI (Entity ID in your app): Unique identifier of your custom application; same as Entity Id in SAML authentication field (e.g. https://yourcompanysubdomain.clockify.me)
Default Relay State: IdP-initiated authentication so that users can log in to Clockify straight from the Okta dashboard
Finally, your screen in Clockify should look something like this:
and
After entering all required data, you can choose to verify your configuration by clicking the Test configuration button. This action ensures the accuracy of the provided information. If everything is correct, the Test configuration button will be replaced with a Finish configuration button.
Click Finish configuration to complete the process and enable Log in with SAML2. Optionally, disable Log in with email and password.
Navigate to Users (this is where you choose which users from your OneLogin account will be able to access Clockify)
Click on the specific User
In Applications, click the + sign to add an app
Choose Clockify
Click Continue and Save
In Clockify, after entering all required data, you can choose to verify your configuration by clicking the Test configuration button. This action ensures the accuracy of the provided information. If everything is correct, the Test configuration button will be replaced with a Finish configuration button.
Click Finish configuration to complete the process and enable Log in with SAML 2.0. Optionally, you can disable Log in with email and password.
And that’s it! Now you, and your workspace users are able to log in to your workspace with SAML 2.0.
You’ll proceed to the Google Identity Provider details screen Google side:
Download IdP metadata URL and upload it to Clockify/IdP Metadata URL field
Copy SSO URL and paste it to Login URL field in Clockify Clockify side:
Click Continue Google side:
You’ll proceed to Service provider details
Insert the following: – ACS URL: Copy/paste Reply URL from Clockify, e.g. https://global.api.clockify.me/auth/saml2 – Entity ID: Unique identifier of your custom application, e.g. Clockify – Start URL: Copy/paste Default Relay State from Clockify, e.g.
After entering all required data, on the Clockify side, you can choose to verify your configuration by clicking the Test configuration button. This action ensures the accuracy of the provided information. If everything is correct, the Test configuration button will be replaced with a Finish configuration button.
Now that you’ve completed all the steps and created the app, open the app’s settings and in Service status enable the app for everyone.
The app you created will appear in the Google workspace for all the users of that workspace.
Give app a descriptive name, select category and upload a logo
Check Single Sign-on (SAML)
Click Continue
Confirm that you are Application Admin
New page with SSO instructions opens and you can proceed with the next step. The page contains SSO Setup instructions which include the IdP Metadata XML file.
Upload IdP Metadata XML file you downloaded in Step 2 or
Copy/paste IdP Metadata URL from Rippling
Login Url: Copy/paste Single Sign-on URL/Target URL from Rippling
After entering all required data, you can choose to verify your configuration by clicking the Test configuration button. This action ensures the accuracy of the provided information. If everything is correct, the Test configuration button will be replaced with a Finish configuration button.
Click Finish configuration to complete the process and enable Log in with SAML2. Optionally, disable Log in with email and password.
On SSO Instructions page scroll down and enter the following:
ACS URL: Copy/paste Reply URL from Clockify
Service Provider Entity ID: Copy/paste Entity ID from Clockify
Click Move to Next Step
Choose Access Rules you want
Choose Provision Time you want
Configure SSO for Admins if necessary
Configure Group Attributes if necessary
Click Connect via Rippling if you’d like to check the connection between apps or simply Continue
And that’s it! You’ve successfully installed your application in rippling and you and your users are now able to log in to your workspace with SAML 2.0.
In SSO tab you can proceed with the next step. The page contains SSO Setup instructions which include the IdP Metadata XML file. Download IDP Metadata from JumpCloud and save it for later.
In User attribute mapping add attributes mapping Service Provider Attribute Name to JumpCloud Attribute Name
Click Activate
Open the application you created
Click on IDP Certificate Valid on the left and download the certificate
Click Save
You’ve successfully created your application in JumpCloud. Now you can decide which users from your JumpCloud account will be able to access Clockify and finish the configuration in Clockify.
Metadata Url: Upload IdP Metadata XML file you downloaded in Step 3
IdP Url: Copy/paste IDP URL from JumpCloud
Advanced: Copy/paste IDP Certificate from JumpCloud
After entering all required data, you can choose to verify your configuration by clicking the Test configuration button. This action ensures the accuracy of the provided information. If everything is correct, the Test configuration button will be replaced with a Finish configuration button.
Click Finish configuration to complete the process and enable Log in with SAML2. Optionally, disable Log in with email and password.
Once you move to subdomain, the default Google log-in will stop working and you’ll have to configure it manually to continue using it.
Setting up Google log-in is quick and easy.
You’ll need to have a G Suite or Cloud Identity account in order to do this.
You need to Set up OAuth 2.0 in your Google account, create a project and get OAuth 2.0 client ID for a web application.
In Google Cloud Platform navigate to API & Services and choose Credentials. Open the project/application you’ve created and paste https://yoursubdomain.clockify.me/login under the Authorized redirect URIs.
You should also add the following URIs in order for the OAuth login to work on Clockify mobile apps:
If you’re using one of the regional servers for hosting, please note that the URLs for workspaces that are on subdomain won’t contain the indicator of the region in question, although they are hosted on a regional server.
In Clockify, go to Authentication tab
Click Add SSO Configiuration
Choose OAuth2 authentication type
Choose Google in IdP Templates modal
Click Next
Copy/paste Client ID and Client Secret from your Google app as seen in the example below (fields in the Advanced section will be pre-populated)
Your screen in Clockify should look something like this:
and
After entering all required data, you can choose to verify your configuration by clicking the Test configuration button. This action ensures the accuracy of the provided information. If everything is correct, the Test configuration button will be replaced with a Finish configuration button.
Click Finish configuration to complete the process. Check the Log in with OAuth checkbox to start using Google login. Optionally, you can force everyone to use your company’s Google identity for logging in by disabling Log in with email and password.
Supported account types: Choose what you prefer; in our case it’s Accounts in this organizational directory only (Default Directory only – Single tenant)
Redirect URI: Paste Redirect URL you copied from Step 2; https://yourcompanysubdomain.clockify.me/login (it can also be: https://yourcompanysubdomain.clockify.me/login/ios/oauth2 or https://yourcompanysubdomain.clockify.me/login/android/oauth2) and click Register to continue
Or, if you’re using one of the regional servers, you should add one of the regional URLs.
Client Id: Go to Azure — Overview — Application (client) ID: copy the value and paste it back in Clockify
Client Secret: this should already be pasted from previous steps (Certificates & Secrets)
Directory (tenant) ID: Go to Azure — Overview — Directory (tenant) ID copy the value and paste it back in Clockify
Fields in the Advanced section will be pre-populated.
Your screen in Clockify should look something like this:
and
After entering all required data, you can choose to verify your configuration by clicking the Test configuration button. This action ensures the accuracy of the provided information. If everything is correct, the Test configuration button will be replaced with a Finish configuration button.
Click Finish configuration to complete the process. Check the Log in with OAuth checkbox (and optionally disable Log in with email and password).
Entity Id: (this is where you put your subdomain address, in our case it’s https://yourcompanysubdomain.clockify.me/)
Federation Metadata: Navigate to Azure, under SAML Certificates copy/paste App Federation Metadata Url in Clockify
Login Url: Navigate to Azure, under Set up Clockify find Login URL and copy/paste it in Clockify
Your screen should look like this:
and like this:
After entering all required data, you can choose to verify your configuration by clicking the Test configuration button. This action ensures the accuracy of the provided information. If everything is correct, the Test configuration button will be replaced with a Finish configuration button.
Click Finish configuration and enable Log in with SAML2 (and optionally disable Log in with email and password).
Now, in Clockify, in Authentication screen where you created your subdomain:
Click Add SSO Configuration at the bottom of the screen
Choose OAuth2 as authentication type
Choose Okta as IdP Template
Click Next
In OAuth 2.0 (OIDC) authentication form enter the following information:
Client ID: Generated in Okta in the previous step; copy it from the Client Credentials section
Client Secret: Same as Client ID; copy it from the Client Credentials section
Okta Domain: Copy it from Okta, General Settings, Okta domain field (Note: Okta Domain requires a domain name only, for example: doamin_name.okta.com instead of: https://domain_name.okta.com)
Advanced section is pre-populated (automatically generated)
Choose Assign to People/Groups depending on who from your Okta account you’d like to be able to access Clockify
After entering all required data, on the Clockify side, you can choose to verify your configuration by clicking the Test configuration button. This action ensures the accuracy of the provided information. If everything is correct, the Test configuration button will be replaced with a Finish configuration button.
Click Finish configuration to complete the process and enable Log in with OAuth. Optionally, you can disable Log in with email and password.
Finally, your screen in Clockify should look something like this:
And that’s it! Now you, and your workspace users are able to log in to your workspace with OAuth 2.0 (OIDC).