Skip to main content
Exec supports enterprise-grade Single Sign-On (SSO) and Directory Sync (SCIM) to give your organization centralized control over authentication and user provisioning. Our integrations are powered by WorkOS, providing compatibility with all major identity providers through industry-standard protocols.

When to Use What

CapabilityPasswordSSOSSO + SCIM
Centralized access control✔️✔️
Enforce corporate credentials✔️✔️
Eliminate separate passwords✔️✔️
Automatic user provisioning✔️
Automatic user deprovisioning✔️
Group-based role assignment✔️
Real-time directory updates✔️

Supported Protocols

ProtocolDetails
SAML 2.0Full support for SP-initiated and IdP-initiated SSO flows
OpenID Connect (OIDC)OAuth 2.0 authorization code grant with ID tokens
SCIM 2.0Automated user and group provisioning and deprovisioning

Supported Identity Providers

Exec integrates with any identity provider that supports SAML 2.0 or OpenID Connect. The following providers have been tested and have guided setup documentation available:
ProviderSSODirectory Sync (SCIM)
Okta✔️✔️
Microsoft Entra ID (Azure AD)✔️✔️
Google Workspace✔️✔️
OneLogin✔️✔️
PingFederate✔️✔️
PingOne✔️
JumpCloud✔️✔️
Duo✔️
AD FS✔️
Rippling✔️✔️
CyberArk✔️✔️
Any SAML 2.0 / OIDC provider✔️
Any SCIM 2.0 provider✔️
If your identity provider is not listed above, contact your Exec account representative. We can support any provider that implements SAML 2.0, OIDC, or SCIM 2.0 standards.
For the full list of supported providers and setup guides, see the WorkOS integrations page.

How It Works

Single Sign-On (SSO)

SSO allows your employees to access Exec using their existing corporate credentials through your organization’s identity provider. Once SSO is enabled for a workspace, it becomes the mandatory authentication method for all users in that workspace.
BehaviorDescription
Mandatory once enabledWhen SSO is turned on for a workspace, it is the only way to authenticate. All users must sign in through the identity provider.
No JIT provisioningSSO alone does not automatically create user accounts. Users must both be allowed in the identity provider and invited into Exec. For automatic account creation, enable Directory Sync (SCIM).
SP and IdP initiatedUsers can sign in from the Exec login page (SP-initiated) or from their identity provider dashboard (IdP-initiated).

Directory Sync (SCIM)

Directory Sync provides automated user lifecycle management by connecting Exec to your organization’s directory. When an employee is added to or removed from the appropriate group in your identity provider, their Exec account is automatically provisioned or deprovisioned.
BehaviorDescription
Auto-provisioningUsers assigned to the Exec application in your identity provider are automatically created in the Exec workspace.
Auto-deprovisioningUsers removed from the Exec application in your identity provider are automatically deactivated in Exec.
Group syncGroups from your directory are synced to Exec, enabling group-based role assignment and access control.
Requires SSODirectory Sync is designed to work alongside SSO. If you enable SCIM, SSO should also be enabled to ensure a seamless authentication experience.

Getting Started

Exec uses WorkOS to power SSO and Directory Sync setup. WorkOS provides a guided, self-service Admin Portal that walks your IT team through configuration with step-by-step instructions specific to your identity provider.
1

Contact Your Account Representative

Reach out to your Exec account representative to request SSO or Directory Sync setup.
2

Receive Your Setup Link

Your IT admin will receive a link to the WorkOS Admin Portal with guided, step-by-step instructions for your specific identity provider.
3

Configure in the Admin Portal

Your IT team completes the configuration directly in the Admin Portal. No back-and-forth required.
For more on how the setup process works, see the WorkOS Admin Portal documentation.

Frequently Asked Questions

No. Once SSO is enabled for a workspace, all users must authenticate through your identity provider. Password-based login is no longer available for that workspace.
No, SCIM is optional. SSO alone provides centralized authentication. SCIM adds automated provisioning and deprovisioning, which is recommended for organizations that want to reduce manual user management.
Exec relies on your identity provider for multi-factor authentication. When SSO is enabled, your organization’s MFA policies are enforced through your identity provider during the authentication flow.
We support any provider that implements SAML 2.0 or OpenID Connect, which covers virtually all enterprise identity providers. See the full list above.

Getting Help

Need help? Contact us at [email protected] for guidance on SSO or Directory Sync setup, or reach out to your Exec account representative with any questions.