Single sign-on (SSO)

How to set up SSO for your Fundraise Up account.

Single sign-on (SSO) is a technology that lets users log in to multiple applications with one set of credentials. This reduces the need for multiple passwords and centralizes account management, which improves security and simplifies access control for your .

The Fundraise Up SSO solution uses the SAML 2.0 protocol, which means you can choose from many third-party Identity Providers (IdPs) to manage your SSO options. Compatible IdPs include Okta, Auth0, Microsoft Entra ID, and others.

Before you begin

 
Link copied

Before you set up SSO, make sure that you have:

  • Administrator access to your organization’s IdP account.
  • Organization Administrator access to your Fundraise Up account.
Only one IdP can be configured for each account.

Step 1. Set up SSO in the IdP interface

 
Link copied
  1. Go to your IdP management panel.
  2. Create a new SSO application. Give it a descriptive name like Fundraise Up SSO.
  3. Configure the application with these parameters:
    • Entity ID (or Audience URL): https://dashboard.fundraiseup.com/sso/saml
    • SSO URL (or ACS URL): https://dashboard.fundraiseup.com/user/saml/consume
    • Name ID format: Email Address
  4. Locate and copy these from your IdP:
    • Issuer ID (also called Entity ID)
    • Identity provider URL (also called Single sign-on URL or SAML endpoint)
    • Identity provider certificate (or X.509 certificate)

    You'll need these in Step 2.

Step 2. Complete SSO configuration in the Dashboard

 
Link copied
  1. In the Fundraise Up , go to Settings > Security.
  2. Under Single sign-on (SSO) configuration, click Configure.
  3. Enter the parameters from your IdP:
    • Issuer ID
    • Identity provider URL
    • Identity provider certificate
  4. Click Verify.
SSO configuration modal with fields for Issuer ID, Identity provider URL, and Identity provider certificate, along with a "Verify" button and cancel option. Instructions for obtaining information are provided.

SSO configuration screen for entering IdP parameters

After verification, SSO is set to Off by default. You’ll enable it after verifying your domains in Step 3.

Step 3. Verify domains

 
Link copied

SSO requires domain verification to confirm that you control the email domains your team uses. This security measure prevents unauthorized access.

  1. Go to Settings > Security.
  2. Locate Single sign-on (SSO) domains and click Add domain.
  3. Enter your domain name (for example, example.org).
  4. In the modal window, follow the DNS configuration instructions to add a TXT record to your domain’s DNS settings.
  5. Click Verify.
Domain verification details for example.com, including record name, type, title, and value. Options to cancel or verify the information are available. The background shows a dashboard interface with security settings.

Domain verification details

DNS changes can take time to take effect. If verification fails, wait a few hours and try again.

After verification, only users with email addresses from verified domains can log in with SSO. Verified domains appear in the Single sign-on (SSO) domains section with their verification status.

How to retry verification

 
Link copied

If verification fails:

  1. Click the three-dot menu next to the domain marked Not Verified.
  2. Select See details.
  3. Confirm your DNS record matches the instructions.
  4. Click Verify.

To delete a domain, click the three-dot menu next to it and select Delete.

Okta-specific setup instructions

 
Link copied

If you use Okta as your IdP, follow these Okta-specific instructions instead of the general steps above.

Okta is one of the most popular Identity Providers. The Fundraise Up SSO app is available in the Okta Integration Network, which simplifies setup.

  1. Log in to the Okta Admin Console.
  2. Go to Applications > Applications.
  3. Click Browse App Catalog.
  4. Search for Fundraise Up SSO.
  5. On the Fundraise Up SSO page, click Add.
  6. Enter the required information under General Settings and click Next.
  7. Go to the Sign On Options section.
  8. Under Credentials Details, select Email from Application username format.
  9. Click Done.
  10. On the Assignments tab, add the users who need Dashboard access.
  11. Go to the Sign On tab.
  12. Under SAML 2.0, click More details in the Metadata details section.
    Okta Admin Console displaying SAML 2.0 settings, including options for Default Relay State, Maximum App Session Lifetime, and a Metadata URL with a "Copy" button and "More details" option.

  13. Copy the Sign on URL, Issuer, and Signing Certificate. You’ll enter these in the Dashboard.
    Okta Admin Console displaying sign-on and sign-out URLs, issuer information, and an option to download the signing certificate, each with corresponding copy buttons.

  14. In Fundraise Up Dashboard, go to Settings > Security.
  15. Under Single sign-on (SSO) configuration, click Configure.
  16. Enter the values that you copied in step 13.
  17. Click Verify.
  18. Continue with domain verification as described in Step 3 above.

Enable and disable SSO

 
Link copied

After completing setup and domain verification, go to Settings > Security to enable SSO.

SSO has three settings:

  • Off. SSO is disabled (default). Users log in with username and password.
  • Optional. Users can log in with either SSO or username and password.
  • Required. All users must log in using SSO only.

To enable SSO, select Optional or Required under SSO enforcement and click Save changes.

Single sign-on (SSO) configuration settings for Fundraise Up, showing options for enforcement and a list of domains with their status and added dates. Includes buttons for configuring settings and saving changes.

Choose the enforcement level that matches your security requirements

Fundraise Up does not support auto-provisioning. You must manually add or delete users in both your account and your IdP. When someone's status or credentials change in the IdP, you need to update their Fundraise Up account manually.

SSO session duration

 
Link copied

Each SSO session lasts 12 hours, after which users are automatically logged out and must sign in again.

Domains are automatically verified every Sunday. If your DNS settings are removed or modified, the domain's verification status changes to Not verified, and users lose SSO access. To restore access, verify the domain again using the process described in Step 3.

How SSO impacts your users

 
Link copied

When you enable SSO, it changes how users log in and what they experience. Here's what happens at each stage.

When you first enable SSO

 
Link copied

When you set SSO enforcement to Required, all current users are automatically logged out and redirected to the login screen. This includes the Organization Administrator who configures SSO. When users enter their email address at login, they’re prompted to log in using SSO instead of a password.

New users added after SSO is set to Required receive an invitation email with an Accept invite button. After successful authorization, they receive a confirmation email explaining they can log in using SSO.

Invitation to join Helping Hand team on Fundraise Up from Julia Bowman. Includes a button to accept the invite using single sign-on.

Welcome email for new users with SSO login instructions

For Optional SSO, users receive an invitation email with an Accept invite button. Clicking this takes them to the Dashboard. They then receive a second email with their username and password. If their email domain has been verified, the email also mentions they can log in using SSO. If the domain is not verified, users only receive username and password information.

If you’re logged in with SSO and someone changes the account’s SSO status to Off, you’ll be logged out immediately.

Dashboard login options

 
Link copied

If SSO is enabled for your account, users have two ways to log in.

Email-based login

When a user enters their email address in the login form, the system checks whether they’re eligible for SSO. If they are, the password field disappears and the Continue with SSO button appears.

If SSO is set to Optional, users can also log in with a password by clicking the Use your password instead link.

Direct SSO login

Users who know they can use SSO can click the Use single sign-on (SSO) instead link below the login form. They then enter their email and click Continue with SSO.

Only users with email addresses on verified domains can use SSO to log in. You cannot add users to a Required SSO account if their email domain is not verified.

Users who manage multiple accounts

 
Link copied

Some users have access to multiple, unrelated accounts. In these cases:

  • Users can only use SSO across accounts if all accounts use the same IdP with the same Issuer ID.
  • When logging in from the main login page, users are redirected to the last account they accessed.
  • Users can log in with a password only if the last accessed account has SSO set to Off or Optional.
  • Users with SSO access in one account cannot be added to another account with Required or Optional SSO unless both accounts use the same IdP and Issuer ID.

If you have users who access multiple accounts, consider using the same IdP configuration across all accounts to simplify their login experience.

This behavior doesn’t apply to parent and subaccount setups. See the section below for how SSO works with parent and subaccounts.

SSO behavior with parent and subaccounts

 
Link copied

SSO settings aren't inherited between parent and . Each account can have different SSO settings or not use SSO at all. If you have parent and subaccounts, configure SSO separately for each one.

User access is shared: when you add a user to the parent account, they automatically get access to all connected subaccounts.

This means:

  • If a user logs in to the parent account using SSO, they stay logged in when switching to subaccounts — even if those subaccounts don't use SSO.
  • If a user logs in to a subaccount using a password, they can't switch to a parent account that requires SSO.
  • To avoid access issues, users should log in through the parent account when SSO is enabled there.

2FA and SSO

 
Link copied

For accounts with SSO set to Required, users don’t need to use two-factor authentication (2FA) when logging in, even if 2FA is enabled for the account. This is because the IdP handles authentication security.

To check which team members can log in to the Dashboard using SSO, go to Settings > Team. Users who can use SSO are listed along with their 2FA configuration.

IdP-initiated login

 
Link copied

The setup instructions above describe SP-initiated SSO, where users start at the Fundraise Up login page. There's another way called IdP-initiated login, where users start from their IdP's dashboard and click a link to access Fundraise Up directly.

IdP-initiated login is strongly discouraged due to significant security risks.

IdP-initiated authentication creates serious security vulnerabilities, including:

  • Man-in-the-middle attacks, where malicious actors intercept authentication data.
  • Replay attacks, where stolen credentials are reused for unauthorized access.

These risks can compromise your ' data and your organization's security.

If you still want to use IdP-initiated login

 
Link copied

You must ensure that your IdP signs the SAML response. Configure this in your IdP settings:

  • Auth0. Go to the SAML2 settings and set signResponse to true.
  • Microsoft Entra ID. Configure the response according to Microsoft’s documentation.
    How to configure IdP-initiated login in Microsoft Entra ID.
  • Okta. Go to your application’s General settings, select Show advanced settings, and make sure Response is set to Signed (the default).

SSO capabilities in Fundraise Up

 
Link copied

This table shows which SSO features are available in Fundraise Up and what they mean for your organization.

FeatureSupportedDescription
IdP-initiated SSOYesUsers can start the login process from their IdP’s dashboard and be automatically signed in to Fundraise Up. This method has security risks (see “IdP-initiated login” section above).
SP-initiated SSOYesUsers start the login process from the Fundraise Up login page and are redirected to your IdP for authentication. This is the recommended method.
Just-in-time provisioningNoUser accounts are not automatically created when someone logs in with SSO for the first time. You must add users manually in the Dashboard before they can log in.
SP-initiated SLO (Single Logout)YesWhen users log out of Fundraise Up, they’re also logged out of your IdP and all connected services.
Force authenticationNoUsers are not required to re-authenticate with the IdP if they already have an active session.

Troubleshooting

 
Link copied

If you run into issues during setup, try these solutions.

  • Domain verification fails. If domain verification fails right after you click Verify, your DNS changes likely haven’t taken effect yet. Wait a few hours and try again.
  • Users can’t log in after enabling SSO. Make sure that:
    • The user’s email domain is verified in Settings > Security > Single sign-on (SSO) domains.
    • The user has been added to the Dashboard under Settings > Team.
    • The user has been assigned to the SSO application in your IdP.
  • Certificate errors. If you see certificate-related errors during setup, verify that:
    • You copied the entire certificate.
    • No extra spaces or line breaks were added when pasting.
    • The certificate hasn’t expired in your IdP.
  • Need to disable SSO. If you need to disable SSO temporarily:
    1. Go to Settings > Security.
    2. Under SSO enforcement, select Off.
    3. Click Save changes.

    Users will be able to log in with their username and password immediately.

If none of these solutions work, contact Fundraise Up support for help.

Next steps

 
Link copied

After completing your SSO configuration:

  • Test SSO login with a team member without admin privileges to confirm it works correctly.
  • Communicate the change to your team, including when SSO becomes active and how it affects their login process.
  • Consider creating internal documentation for your team explaining how to log in with SSO.
  • Check which team members have SSO access by going to Settings > Team.

If you’re setting SSO to Required, consider starting with Optional for a few days to give your team time to adapt before enforcing it.