Skip to main content

SSO (Single Sign On)

Leo Costa avatar
Written by Leo Costa
Updated over a month ago

Mercu supports SSO (Single Sign On) via Auth0's Enterprise Connections. To set this up, please contact your Mercu Account Manager or Onboarding Manager.

We support the following providers:

Okta Workforce

See here for details.

Google Workspace

If you're using Google Workspace, you need to register our Auth0 instance as a new application on your Google Workspace. Please follow the steps outlined here.

During this process, Google will generate a Client ID and Client Secret for your application; make note of these.

While setting up your app, be sure to use these settings: On the OAuth consent screen, under Authorized domains, add auth0.com. When asked to select an application type, choose Web application and set the following parameters:

Once you registered our Auth0 instance as a new application by following the steps outlined here, we need the following details from you:

  • Your workspace domain

  • Your Client ID

  • Your Client Secret

We recommend you share these details with us by using a password manager like LastPass. Once received, we will set up the SSO.

MS Entra ID (formerly MS Azure AD)

If you're using MS Entra ID, you need to register our Auth0 instance as a new application on your MS Entra ID environment. Please follow the steps outlined here.

Our redirect URI is https://mercu.au.auth0.com/login/callback and the platform type is Web Application.

Once you registered our Auth0 instance as a new application by following the steps outlined here, we need the following details from you:

Microsoft Azure AD Domain

Your Azure AD domain name. You can find this on your Azure AD directory's overview page in the Microsoft Azure portal.

Client ID

Unique identifier for your registered Azure AD application. Enter the saved value of the Application (client) ID for the Native application you registered in Azure AD.

Client Secret

String used to gain access to your registered Azure AD application. Enter the saved value of the Client secret for the Native app you registered in Azure AD.

IMPORTANT: Please share the secret value, not the secret Id. Otherwise, SSO won't work.

We recommend you share these details with us by using a password manager like LastPass. Once received, we will set up the SSO.

Did this answer your question?