Developer portal
Identity provider setup
Eight IdPs, same platform. SAML + OIDC for login, SCIM 2.0 for provisioning. Full integration guides with screenshots in the product help.
Supported IdPs
| IdP | Protocol | SCIM | Note |
|---|---|---|---|
| Okta | Both | Yes | Native Okta Integration Network app. |
| Microsoft Entra ID | Both | Yes | Gallery app for SAML + SCIM; OIDC via custom registration. |
| Google Workspace | Both | Yes | Custom SAML app template + SCIM via an Admin SDK bridge. |
| JumpCloud | Both | Yes | SAML+SCIM tested; OIDC supported. |
| OneLogin | Both | Yes | SAML+SCIM fully supported. |
| Auth0 | OIDC | No | OIDC supported via Auth0 as IdP; SCIM not supported by Auth0. |
| Ping Identity | Both | Yes | SAML+SCIM certified. |
| Duo SSO | SAML | No | SAML only. |
Generic setup shape
- In the QEHS app, open
https://app.qehsethos.com/settings/ssoand copy the Entity ID / ACS URL (SAML) or Client ID / Redirect URI (OIDC). - In your IdP, create a new SAML/OIDC app and paste the values.
- Download the IdP signing certificate (SAML) or discovery URL (OIDC) and paste back into QEHS.
- Define attribute / claim mappings — email, first name, last name, groups.
- Enable JIT provisioning (creates users on first login) OR go further and configure SCIM.
- Test with a single user; once green, enforce SSO for the tenant.