Set Up SAML Single Sign-On (SSO) for Your Simplebooklet Team Account
Set Up SAML Single Sign-On (SSO) for Your Simplebooklet Team Account
Simplebooklet supports SAML-based Single Sign-On (SSO) so your organization can manage employee access through your existing identity provider (IdP).
We currently support Google Workspace (Google Admin) and Microsoft Entra ID (Azure).
What You’ll Need
Before beginning, make sure you have:
- Admin access to your Simplebooklet Team Account
- Admin access to Google Workspace or Microsoft Entra ID (Azure)
- The ability to add or configure new SAML apps in your IdP
You’ll complete a simple copy-and-paste exchange between Simplebooklet and your identity provider.
Option 1: Set Up SSO with Google Workspace
Step 1 — Open SAML Settings in Simplebooklet
- Go to your Dashboard.
- Select Account → Team Account → SAML Settings.
(Direct link: https://simplebooklet.com/dashboard.php?pid=team-account-manage)
Keep this page open — you’ll copy values from Google and paste them here.
Step 2 — Create a Custom SAML App in Google
- Go to admin.google.com
- In the left menu, select Apps → Web and Mobile Apps
- Click Add App → Add Custom SAML App
- Name it (e.g., Simplebooklet SSO)
Step 3 — Copy Values FROM Google TO Simplebooklet
Google will display three key values. Copy each into your Simplebooklet SAML settings:
Google (IdP) Value | Paste Into Simplebooklet |
|---|---|
SSO URL | IDP SSO URL |
Entity ID | IDP Entity ID |
Certificate (x509 PEM) | IDP x509 Cert PEM |
Your certificate must be pasted as plain text and usually includes:
-----BEGIN CERTIFICATE-----
Step 4 — Copy Values FROM Simplebooklet TO Google
Return to your Simplebooklet SAML settings and copy:
Simplebooklet (SP) Value | Paste Into Google |
|---|---|
ACS URL | ACS URL |
Entity ID | Entity ID |
Then click Continue → Finish in Google.
Step 5 — Save in Simplebooklet
Back in Simplebooklet, click Save.
Your Google SSO app is now connected.
Any user in your Google Workspace who is granted access will automatically become a permission-controlled subaccount under your Team Account.
Option 2: Set Up SSO with Microsoft Entra ID (Azure)
A. Create an Enterprise Application
- Go to the Azure Portal → Microsoft Entra ID
- Select Enterprise Applications
- Click + New Application
- Choose Create your own application
- Name it (e.g., Simplebooklet SSO)
- Select Integrate any other application you don’t find in the gallery (Non-gallery)
This creates a blank SAML app.
B. Enable SAML Setup
- Open your new app
- Go to Single sign-on
- Select SAML
Azure will show four SAML configuration areas.
Step 1 — Copy Values FROM Simplebooklet TO Azure
Open your Simplebooklet SAML Settings here:
https://simplebooklet.com/dashboard.php?pid=team-account-manage
Copy and paste:
Simplebooklet Value | Paste Into Azure |
|---|---|
ACS URL | Reply URL (ACS URL) (Required) |
Entity ID | Identifier (Entity ID) (Required) |
Sign-On URL (optional) | Sign-On URL |
Logout URL (optional) | Logout URL |
Step 2 — Copy Values FROM Azure TO Simplebooklet
Azure Value | Paste Into Simplebooklet |
|---|---|
Microsoft Entra Identifier | IDP Entity ID |
Login URL | IDP SSO URL |
Certificate (Base64 / PEM) | IDP x509 Cert PEM |
Logout URL (optional) | IDP SLO URL |
Paste the full PEM certificate text, including the header and footer.
Step 3 — Save
In Simplebooklet, click Save.
Your Azure SSO connection is now active.
Users assigned to the Azure SAML application will automatically become managed subaccounts inside your Simplebooklet Team Account.
Notes & Best Practices
- You only need to set this up once per organization.
- Your IdP entirely controls who can log into Simplebooklet.
- Assign or remove permissions from Google Admin or Azure, not inside Simplebooklet.
For security:
- Only admins should access SAML settings
- Certificates must stay current
- Review your assigned users regularly
Updated on: 03/12/2025
Thank you!