Logo of TAGGRS, written in blue and with a small favicon
HomeServer-side TrackingMeta CAPI Gateway
SERVER-SIDE TRACKING
Get started
Get started with TAGGRSSet up Google Tag ManagerAdd the GTM Data LayerConfigure GTM transformationsTest the setupDebuggingAnalytics dashboard
Migrate from Google CloudMigrate from hosting
Shortcuts
GTM Copy PasteReady-made templates
GA4 Server-side Tracking
Setup in GTMCreate GA4 Event TagsGA4 tag setup in server containerE-commerce events in GTM
Google Ads Server-side Tracking
Install Conversion LinkerSet up Conversion TrackingConfigure Enhanced ConversionsDeploy Remarketing TagsInstall Offline Conversions
Facebook Server-side Tracking
Set Meta PixelImprove your EMQ ScoreInstall Meta CAPIMeta Events Deduplication
LinkedIn Server-side Tracking
Install LinkedIn Insight TagSet up LinkedIn CAPILinkedIn Events Deduplication
TikTok Server-side Tracking
Set up TikTok PixelInstall TikTok Events APITikTok Events Deduplication
Pinterest Server-side Tracking
Set up Pinterest TagConfigure Pinterest Conversions APIPinterest Events Deduplication
Snapchat Server-side Tracking
Set up Snap PixelSnapchat Conversions APISnapchat Events Deduplication
TAGGRS Tracking Tags and Tools
Tracking TagsGoogle Service Account integrationsGTM LogsProfit TrackingData Enricher ToolWebhooks TesterEnhanced Tracking ScriptMulti Domain ToolClick ID RecoveryConsent Approval Graph
Configurations
Billy Grace Server-side TrackingLeadPages Server-side TrackingPiwik PRO Server-side TrackingCDN Server-side TrackingShopify Server-side TrackingActiveCampaign Server-side TrackingKlaviyo Server-side TrackingSpectacle Server-side TrackingEulerian Server-side Tracking
Server-side Tracking for e-commerce
Shopify Data LayerShopware Data LayerMagento Data LayerWooCommerce Data LayerPrestashop Data LayerLightspeed Data Layer
Consent Management server-side
Activate Consent ModeConfigure AxeptioConfigure Cookie Confirm
META CAPI GATEWAY
ACCOUNT SETTINGS
User roles and accessSSO

Set up Single Sign-On (SSO)

TAGGRS Single Sign-On (SSO) lets your team securely log in using your existing identity provider (IdP). With SSO enabled, user access is managed centrally, new users are created automatically on first login, and you no longer need manual invitations or password management.
This guide explains how to configure SAML 2.0 SSO in TAGGRS using Okta, OneLogin, or any SAML 2.0–compatible IdP.
icon of a white thunder used by TAGGRS to visually introduce Server-side Tracking
SSO is available for Enterprise plans. Want to upgrade your TAGGRS subscription? Talk to Sales.
icon of a white upward arrow

Prerequisites

Before starting, make sure:

  • You have at least one existing TAGGRS user in the organization
  • Your team uses a shared business email domain (e.g. @mycompany.com)
  • You use a SAML 2.0–compatible IdP, such as OneLogin, Okta, or Azure AD
Logo of TAGGRS Server-side Tracking: a light blue circle with two blue angle brackets
Note
‍
Once SSO is activated, additional users do not need existing TAGGRS accounts. They will be created automatically on first login.

Activation

To enable SAML SSO on your company account:

1. Log in to TAGGRS
2. Go to Profile → Organization → Single Sign-On (SSO)
3. Click Contact Support to request SSO activation for your organization.

Contact support to activate SSO for your organization

Once SSO is enabled for your company account, you can fill in the details:

Metadata needed to activate SSO in TAGGRS
  • SSO Identifier: the name of your IdP (e.g. one login, okta, or azure)
  • SAML Metadata URL: generated by your IdP after you install the SAML application.

Configuration

Install a SAML application in your IdP

In your identity provider, create or install a SAML 2.0 application for TAGGRS and configure it with these standard SAML settings:

Setting
Value
ACS URL Validator / ACS URL / Single sign-on URL
https://connect.taggrs.io/
v1/auth/saml2/callback
SP Entity ID / Audience URI
https://connect.taggrs.io/
v1/saml/metadata
Binding
HTTP-Redirect

Configure your IdP to send the following user attributes to TAGGRS:

Value
Field value
First value
first_name
Last name
last_name
Email
email
Logo of TAGGRS Server-side Tracking: a light blue circle with two blue angle brackets
Important
Attribute names are case-sensitive and must match exactly.

Initiate SSO in TAGGRS

After you configure your IdP:

1. In TAGGRS, go to your Profile page and scroll to the Single Sign-On (SSO) section
2. Enter the SSO Identifier field with the name of your IdP
3. Copy the Metadata URL from your IdP and paste it into the SAML Metadata URL field in TAGGRS.

Once you submit the Metadata URL, TAGGRS validates the SAML configuration and links SSO to your organization and email domain (for example, @mycompany.com).

The SSO connection is now active.

TAGGRS SSO SAML 2.0 is now active in your account
Logo of TAGGRS Server-side Tracking: a light blue circle with two blue angle brackets
Note
Once SSO is active, admins can choose to enforce SSO for users or allow login with other methods.

User access management

User access to TAGGRS is fully controlled in your identity provider (IdP).

Assign users or groups to the TAGGRS SAML application in your IdP's admin console. Only assigned users can access TAGGRS via SSO. Removing assignments immediately revokes access.

First-time login

On a user’s first SSO login:

  • A new TAGGRS user account is created automatically
  • The user is added to your organization and granted access to its products
  • No invitations or manual account setup are required.

This makes onboarding new team members fast and low-maintenance, assuming they are already provisioned in your IdP.

Adding or removing team members

To manage the team:

  • Add a user (or group) to the TAGGRS app in your IdP → they can log in to TAGGRS right away.
  • Remove a user (or group) from the TAGGRS app in your IdP → their TAGGRS access is automatically revoked.

TAGGRS always follows the access rules and assignments defined in your IdP.

Troubleshooting

If login issues occur:

  • Confirm the user’s email domain matches the configured SSO domain
  • Verify attribute mappings (email, first_name, last_name)
  • Ensure the correct Metadata URL is used
  • Double-check user assignment in your identity provider

For advanced issues or to disable SSO for an organization, email TAGGRS support.

FAQ

Why use SSO in TAGGRS?

SAML SSO is designed for agencies and enterprises that manage multiple users and clients at scale. It comes with many benefits, such as easy onboarding and offboarding as your team grows and centralized access control via your identity provider. Learn more about the benefits of SSO.

Useful resources

Guide: How to create SAML app integration in Okta
icon of a white upward arrow
Guide: How to create SAML app integration in OneLogin
icon of a white upward arrow
Guide: How to create SAML app integration in Entra ID
icon of a white upward arrow
Previous
Role-based user management
DOCUMENTATION V1.5
Copyright © 2026 TAGGRS. All right reserved.
TABLE OF CONTENTS
PrerequisitesActivationConfigurationUser access managementTroubleshootingFAQUseful resources