Docs Index

CoderPad SSO Info

Last updated on Available in French

CoderPad supports Single Sign On (SSO) for our business and enterprise plan customers. Any admin on your CoderPad account can configure Single Sign On (SSO) using your organization’s SAML settings.

SSO Setup Quick Reference

To quickly get started with SSO:

  1. As an admin, visit CoderPad Single Sign-On Settings
  2. Download our Service Provider Metadata, linked in the Step 1 header
  3. Use Service Provider Metadata to generate IdP metadata
  4. Import IdP Metadata SAML XML
  5. Set custom login subdomain
  6. Set enforcement of SSO (optional)

SSO Step-by-Step Setup

To get to the SSO settings page, start going to your Team Settings. You can do this by selecting the dropdown with your name in the top right corner of the CoderPad dashboard:

Profile dropdown expanded with options. One of them is "Team Settings"

❗If you don’t see team settings in your dropdown menu, you do not have permissions to update your organization’s CoderPad settings. Please contact your account admin.

As an admin, you’ll be able to see all of your team’s settings. At the bottom of your team settings page, you’ll find a section called “Single Sign-On (SSO)”

In the Single sign-on (SSO) section the "Configure SSO" link is highlighted.

Click on Configure SSO to open the single sign-on options page.

To fully configure SSO for your organization, there are three steps:

  1. Setup provider metadata
  2. SSO login subdomain
  3. Mandatory SSO enforcement

Provider Metadata Setup

First, in order to generate IdP metadata, you need our Service Provider Metadata – we provide it as an XML link in the first paragraph. You can either choose to click the link – which will open the metadata.xml file or right click and select Save link as… to save the XML file to your local storage.

In the provide identity provider metadata step the service provider metadata link is highlightedContext menu on the link to "Save link as" in order to save the file as XML locally

Then, import this file into your SSO provider where they ask for Service Provider metadata. This will generate an IdP metadata file.

Next you’ll need to import this data into CoderPad. You can either choose to manually input data or automatically import.

The coderpad SSO settings screen is shown the the "manual entry" and "automatic import" sections shown.

Automatic import:

Upload your SAML XML metadata file using the upload button OR copy and paste the XML file’s entire contents into the form.

Manual entry:

Simply input the values for:

  • Issuer Entity ID
  • Certificate SHA-1 Fingerprint
  • Single Sign-On Target URL
  • Single Logout Target URL (optional)

✅ We strongly encourage you to utilize our automatic import functionality. These values are long strings that can be easy to confuse and make significant mistakes which may impact login functionality.

SSO Login Subdomain

Now that you’ve configured your IdP information, you’re able to customize your SSO login subdomain. This will give you a dedicated sign in page specifically for your organization.

Customize Sign-In with the set subdomain of "yourcompany.coderpad.io"


You should direct your users to use this subdomain for login; they’ll be greeted with a welcoming login screen specifically for SSO users to reduce confusion.

However, if one of your users accidentally attempts to login through other CoderPad pages – such as our homepage login button – we’ll redirect them to the correct location upon email input.

Login page showing "Your organization only supports logging into CoderPad through your SAML single sign on provider.

Mandatory SSO Enforcement

While we allow organizations to have both SSO and more traditional email/password user accounts, we recommend you enforce SSO login. The benefits of doing this are:

  • Simplification of organization-wide authentication
  • Reduced/simplified IT support requests
  • Ability to add security precautions (such as 2FA)

To make SSO mandatory, simply select the “Enforce SSO” checkbox in the step 3 section.

Make SSO mandatory checkbox is checked here - we suggest doing so in your organization

We strongly encourage you to save this form, and test login with both new and existing user accounts before making SSO mandatory, or you may lock yourself out of your account.

Once you’re done updating your SSO settings, make sure to hit Save to persist your changes.

The coderpad sso screen with the save button highlighted at the bottom.

Technical Information

When enabling SSO, we expect fields for email and name. If you have multiple fields for names (such as first name and last name), you should pass through first name only, or should compress them into a single name field.

CoderPad SSO uses SAML 2.0 for authentication, and we support integration with standard 3rd party SAML providers.

Likewise, while some services provide a certificate as SHA-256 fingerprints, you will need to convert them to a SHA-1 formatting fingerprint if you’re manually inputting IdP metadata into CoderPad.

To do this, copy the Certificate for conversion on a service (such as https://www.samltool.com/fingerprint.php) then copy the SHA-1 formatted fingerprint for entry within CoderPad.

Finally, we do not support automatic user de-provisioning. That said, after a user is deactivated internally in your SSO solution, any CoderPad account admin can deactivate their CoderPad account on the Organization Members page.

External Services Documentation

If you have any questions about getting access to or setting up SSO we are happy to help you out. Contact us and we’ll help get things sorted.