Looking for a MessageMedia page? If you are and were redirected here, it's because MessageMedia is rebranding to Sinch Engage. Learn more about our rebrand.

SINGLE SIGN ON

Simplify access with Single Sign On for Sinch Engage

Single Sign On (SSO) lets your team log in once to access connected applications and services. Sinch Engage supports SAML 2.0 Single Sign On with Microsoft Entra ID and Okta.

Image for Simplify access with Single Sign On for Sinch Engage
Top brands rely on Sinch Engage to reach their customers

BUSINESS OUTCOMES

What Single Sign On delivers for your business

Single Sign On cuts down on the number of passwords your team needs to remember. It speeds up login times across connected applications and services while lowering IT support demand from password reset requests. SSO can also reduce the risk of phishing and password reuse.

Image for What Single Sign On delivers for your business

HOW SSO WORKS

How SAML 2.0 Single Sign On works

A user enters their credentials on your identity provider (IdP), such as Microsoft Entra ID or Okta. The IdP verifies the credentials and generates a secure authentication token. Sinch Engage uses SAML 2.0, which lets IdPs pass authorization credentials safely to service providers.

Image for How SAML 2.0 Single Sign On works

INTEGRATION & SETUP

Connect to your existing identity infrastructure

Sinch Engage integrates with Microsoft Entra ID (Azure AD) and Okta. Setup starts in your IdP, where you create a new SAML application. Then you sign in to the Sinch Engage parent account with admin credentials. You add your email domains and verify ownership with a DNS TXT record.

For trusted locations, the IdP domain must be a subdomain of okta.com or microsoftonline.com.

Image for Connect to your existing identity infrastructure

SECURITY & CONTROL

Strengthen access control across your organization

Turn on Enforce SAML authentication to require SSO for users with matching email domains. When enforcement is on, those users can’t use password login, cutting down the risk of password reuse.

You can also turn on auto-provisioning, so if someone authenticates with SSO and has no profile, Sinch Engage can create one.

Image for Strengthen access control across your organization

WE’RE HERE TO HELP

The SSO advantage with Sinch Engage

Identity provider outage recovery

If your identity provider goes down and SAML enforcement is active, contact the Sinch Engage support team. They can turn off enforcement so admins and existing users can log in with email again.

Centralized user provisioning

When auto-provisioning is on, new users who authenticate through your identity provider get a Sinch Engage profile created automatically.

Enforced authentication compliance

Turn on SAML enforcement to require users with matching email domains to authenticate through your identity provider.

Multi-account domain management

If you use one domain for multiple accounts, add multiple values to one DNS TXT record. Separate values with spaces, and surround each value with double quotes.

CAPABILITIES

Single Sign On capabilities in Sinch Engage

Sinch Engage supports a focused set of Single Sign On capabilities built on the SAML 2.0 standard. Use these controls to reduce admin effort and tighten access control.

  • SAML 2.0 authentication standard

  • Microsoft Entra ID and Okta support

  • DNS TXT record domain verification

  • Enforce SAML authentication toggle

  • Auto-provisioning for new users

  • Multi-account domain verification

CAPABILITIES

How to set up Single Sign On

This setup is intended for IT system administrators. Sinch can support Sinch Engage setup steps, but we can’t support configuration inside your SAML identity provider.

In Microsoft Entra ID, use the Microsoft Entra Gallery and select Create your own application. In Okta, follow the SAML application setup guide.

Sign in to the parent account with admin credentials. Add the email domains you want to use for SSO. Email domains can only be used once per account hierarchy.

Add the DNS TXT record value shown in the SSO configuration screen. Wait for DNS changes to propagate, then save the configuration.

Turn on Enforce SAML authentication to require SSO-only login for matching domains. Turn on auto-provisioning to create new user profiles automatically.

Image for How to set up Single Sign On

FAQ

Common questions about Single Sign On

We answer your most common questions about the Sinch Engage mobile app that lets you manage group chats and mass texts all from your mobile phone.

Single Sign On is an authentication method that lets users log in to multiple applications or services with one set of credentials. Users authenticate once and get access across connected systems.

Sinch Engage uses SAML 2.0 for Single Sign On. SAML 2.0 is an open standard for exchanging authentication and authorization data between an IdP and a service provider.

Sinch Engage supports Microsoft Entra ID (Azure AD) and Okta for Single Sign On. Custom domains and self-hosted identity providers are not supported at this time.

You add a DNS TXT record to your domain’s DNS settings. Use the TXT value shown in the SSO configuration screen. After DNS propagation, save your configuration in Sinch Engage.

If Enforce SAML authentication is on and your IdP is down, contact the Sinch Engage support team. Support can turn off enforcement so administrators and existing users can log in with email again.

No. Active user sessions stay logged in until they expire. The next time a user logs in, they must authenticate through SAML Single Sign On.

When SSO is enforced, users can’t log in with a password, so 2FA is not triggered. When SSO is not enforced, password login triggers 2FA. Users can also choose SSO login, which bypasses 2FA.

Not at this stage. Users must start in the Sinch Engage web portal and use the Login with Single Sign On page. One-tap SSO apps are not supported at this time.

No. Sinch Engage only supports Azure Active Directory (Microsoft Entra ID).

Single Sign On is a request-only feature. Contact the Sinch Engage support team to request that it is activated on your account.