Mercu supports SSO (Single Sign On) via Auth0's Enterprise Connections. To set this up, please contact your Mercu Account Manager or Onboarding Manager.
We support the following providers:
Google Workspace
Okta Workforce
See here for details.
Google Workspace
If you're using Google Workspace, you need to register our Auth0 instance as a new application on your Google Workspace. Please follow the steps outlined here.
During this process, Google will generate a Client ID and Client Secret for your application; make note of these.
While setting up your app, be sure to use these settings: On the OAuth consent screen, under Authorized domains, add auth0.com
. When asked to select an application type, choose Web application and set the following parameters:
Name: The name of your application.
Authorized JavaScript origins: https://mercu.au.auth0.com
Authorized redirect URIs: https://mercu.au.auth0.com/login/callback
Once you registered our Auth0 instance as a new application by following the steps outlined here, we need the following details from you:
Your workspace domain
Your Client ID
Your Client Secret
We recommend you share these details with us by using a password manager like LastPass. Once received, we will set up the SSO.
MS Entra ID (formerly MS Azure AD)
If you're using MS Entra ID, you need to register our Auth0 instance as a new application on your MS Entra ID environment. Please follow the steps outlined here.
Our redirect URI is https://mercu.au.auth0.com/login/callback and the platform type is Web Application.
Once you registered our Auth0 instance as a new application by following the steps outlined here, we need the following details from you:
Microsoft Azure AD Domain | Your Azure AD domain name. You can find this on your Azure AD directory's overview page in the Microsoft Azure portal. |
Client ID | Unique identifier for your registered Azure AD application. Enter the saved value of the Application (client) ID for the Native application you registered in Azure AD. |
Client Secret | String used to gain access to your registered Azure AD application. Enter the saved value of the Client secret for the Native app you registered in Azure AD.
IMPORTANT: Please share the secret value, not the secret Id. Otherwise, SSO won't work. |
We recommend you share these details with us by using a password manager like LastPass. Once received, we will set up the SSO.