Sign in to the Admin Portal
Go to business.quippy-lab.com and sign in
with the admin account your Quippy contact provisioned for you.
- Institution slug — a short identifier for your organization (e.g.
acme-corp). Your Quippy contact will have given you this. - First-time sign-in — you’ll be asked to change the password.
- Admins only — the portal accepts institution administrators. Regular users sign in at the main app, not here.
Admin portal SSO page — screenshot placeholder.
Choose OIDC or SAML, then fill in your IdP details
In the Protocol & routing card, toggle between OIDC and SAML 2.0.
Then fill in the protocol-specific card that appears below.
- OIDC
- SAML 2.0
In the OIDC configuration card:
Scopes default to
| Field | What to paste |
|---|---|
| Issuer URL | The base URL of your OIDC issuer. Must expose /.well-known/openid-configuration. |
| Client ID | The client ID from the app you create in your IdP. |
| Client Secret | The client secret from the same app. Encrypted at rest, never echoed back. |
openid, profile, and email. You don’t need to
change them for standard setups.Copy Quippy's endpoints into your IdP
The Endpoints for your IdP card shows four URLs generated for your
institution. Copy the ones your IdP asks for into its application config.
All four have the shape
| Quippy label | Where it goes in your IdP |
|---|---|
| OIDC Redirect URL | ”Sign-in redirect URI” / “Callback URL” |
| SAML ACS URL | ”Assertion Consumer Service” URL |
| SAML Entity ID | ”Audience URI” / “SP Entity ID” |
| SAML Metadata URL | For IdPs that import SP metadata by URL |
https://api.quippy-lab.com/api/v2/sso/{oidc|saml}/<your-slug>/... so you
can sanity-check that the slug matches your institution.Paste only the URLs your chosen protocol needs. OIDC setups only use
the OIDC Redirect URL; SAML setups use the three SAML URLs.
Set email domains and group → role mapping
In Protocol & routing, add the Email domains your employees use —
e.g.
acme.com, acme.co.uk. When someone enters jane@acme.com on the
login page, Quippy will send them to your IdP instead of prompting for a
password.In Provisioning, configure:- Auto-create users on first sign-in — when on, Quippy creates the user record the first time they sign in via your IdP. When off, only pre-existing members can sign in with SSO.
- Default role — applied when an IdP group claim doesn’t match any
mapping. Valid roles:
admin,manager,editor,member,viewer. - Group → role mapping — map IdP group claim values to Quippy roles.
For example,
quippy-admins → admin,quippy-managers → manager.
Test, then enable
Click Test connection. Quippy will:
- For OIDC — fetch
{issuer}/.well-known/openid-configuration(10-second timeout) and report the discoveredauthorization_endpoint,token_endpoint,jwks_uri, and PKCE support. - For SAML — fetch your IdP Entry Point and confirm the response
looks like SAML metadata (contains
EntityDescriptororIDPSSODescriptor).
Next
- Per-IdP cheat sheets: Okta, Entra, Google Workspace, OneLogin
- Stuck on a test failure? See SSO Troubleshooting.