Skip to main content

Login Options with Pulley (SSO and Email/Password)

Pulley offers multiple sign on options.

Morgan Munger avatar
Written by Morgan Munger
Updated over 4 months ago

Pulley provides multiple login options for company administrators and their stakeholders. Additionally, you can set up two-factor authentication (2FA) for your individual account or company-wide.

This help article covers:

Please note that Pulley can not enforce a singular login option. Users have the ability to utilize their regular email and password login as a default in addition to SSO configured options.

Email and Password Login

Once you’ve entered your email address, you can continue logging in with email by entering your password.

For security reasons, we recommend signing out of your account each time you've finished your session. You will be required to log back in next time you access Pulley elsewhere.

SSO Setup Instructions

Google SSO authentication and setup

Company administrators and stakeholders can log in with Google using a Google supported email address.

1. Access SSO Settings in Google Admin Console

Sign in to the Google Admin console with an administrator account. Navigate to SecurityAuthentication SSO with third party IdP.

2. Find Your SAML Identity Provider (IdP) Details

Locate the "Google Identity Provider details" section. Find the SSO URL, Entity ID, and the Certificate. You may need to click "Download Certificate" or view its details to copy the full PEM content.

3. Copy Details to Pulley

Copy the SSO URL, Entity ID, and the full Certificate content (including the "-----BEGIN CERTIFICATE-----" and "-----END CERTIFICATE-----" lines) from the Google Admin console into the corresponding fields below.

This can be found under the Pulley Navigation Bar → Company → Security.

4. Configure SAML App in Google Workspace (Service Provider Details)

In your Google Admin console, you'll also need to set up Pulley as a SAML application (Service Provider). Go to Apps → Web and mobile apps → Add App → Add custom SAML app.

5. Assign Users to the Custom SAML App

After saving the custom SAML app, ensure it's turned ON for the appropriate users or organizational units in Google Workspace.

Okta SSO authentication and setup

1. Set up Pulley within Applications

Navigate to Applications and select “Create App Integration”.

2. Select SAML and configure integration

Select SAML 2.0, and complete the integration settings by naming the app with Pulley and configuring SAML. Enter the application name and (optional) logo to represent the app.

3. Configure General Settings and enable Provisioning

Within Pulley, navigate to Company and scroll down to the Security section and select Configure for Okta.

Generate a SCIM API key to be used as a Bearer token to set up OKTA user provisioning.

  • In Okta, set SCIM version to 2.0, enter the SCIM connector base URL (https://api.pulley.com/scim/v2), and set the unique identifier field to userName

  • Only select "Push New Users" from the supported provisioning actions and leave all other options unchecked

  • Set Authentication Mode to HTTP Header and enter your Bearer token from Pulley in the Authorization field, then test the configuration before saving

4. Create Users and Rollout

In the Okta Admin Console, assign the app integration to the relevant users or groups who should have SSO access. This step ensures only authorized users can use SSO for the application. Communicate the new SSO process to your users and monitor usage and address any access issues as needed.

Your authorized users will have access to log into Pulley now using Okta SSO.

5. Add Metadata URL to Pulley

Copy the metadata URL from the Okta SAML Configuration and return to Pulley. Paste the metadata URL into the field within Pulley and hit Configure at the bottom of the page.

6. Roll Out to Users

Communicate the new SSO process to your users and monitor usage and address any access issues as needed. Your authorized users will have access to log into Pulley now using Okta SSO.

Rippling

If you’d like to set up Rippling single sign on via their RPass, please learn more or configure it directly within Rippling.

Did this answer your question?