SSO Overview
Single Sign-On (SSO) integration for React Native Stallion - Secure authentication with enterprise identity providers using OIDC.
Free for All Plans:
We believe SSO is a fundamental security feature that shouldn't be monetized. That's why SSO is available for free across all React Native Stallion plans — because secure authentication shouldn't come at a premium.
Single Sign-On (SSO)
Single Sign-On (SSO) allows your team members to authenticate with Stallion using your organization's existing identity provider. This provides a seamless and secure login experience while giving administrators centralized control over access.
Benefits of SSO
- Centralized Access Control - Manage user access through your existing identity provider
- Enhanced Security - Leverage your organization's authentication policies, MFA, and session management
- Simplified Onboarding - New team members can access Stallion immediately using their existing credentials
- Audit & Compliance - Track authentication events through your identity provider's logging
Supported Protocols
SAML 2.0 Coming Soon:
Currently, only OIDC (OpenID Connect) is supported. SAML 2.0 support is coming in February 2026.
Stallion currently supports authentication via OpenID Connect (OIDC), an industry-standard protocol built on top of OAuth 2.0. OIDC provides secure, token-based authentication with support for modern security features.
Supported Identity Providers
Stallion supports SSO integration with the following identity providers:
| Provider | OIDC | SAML 2.0 |
|---|---|---|
| Okta | ✅ | Coming Soon |
| Microsoft Entra ID | ✅ | Coming Soon |
| Keycloak | ✅ | Coming Soon |
| ✅ | Coming Soon | |
| General Integration | ✅ | Coming Soon |
Other Providers:
Don't see your identity provider listed? Any OIDC-compliant provider can be configured using our General OIDC guide.
How It Works
- Admin configures SSO - An organization admin sets up the connection between Stallion and your identity provider
- User initiates login - Team members click "Sign in with SSO" on the Stallion login page
- Redirect to IdP - Users are redirected to your identity provider's login page
- Authentication - Users authenticate using their existing credentials (including MFA if configured)
- Token exchange - Upon successful authentication, Stallion receives an ID token containing user information
- Session created - Stallion creates a session and grants access based on the user's organization membership
Admin Bypass Option
Admin Access:
The admin who configured SSO will always have the option to log in via password or SSO when entering their email. This ensures you can still access your account if SSO is misconfigured or your identity provider is experiencing issues.
Getting Started
To configure SSO for your organization, select your identity provider from the list below:
- Okta OIDC - Configure SSO with Okta
- Microsoft Entra ID OIDC - Configure SSO with Azure AD / Microsoft Entra ID
- Keycloak OIDC - Configure SSO with Keycloak
- Google OIDC - Configure SSO with Google Workspace
- General OIDC - Configure SSO with any OIDC-compliant provider
Requirements
Before setting up SSO, ensure you have:
- A Stallion account (SSO is free on all plans)
- Admin access to your organization in Stallion Console
- Admin access to your identity provider
- The ability to create OIDC applications in your identity provider