Articles on: Team Accounts

Set Up SAML Single Sign-On (SSO) for your Simplebooklet Team Account

Set Up SAML Single Sign-On (SSO) for Your Simplebooklet Team Account


Simplebooklet supports SAML-based Single Sign-On (SSO) so your organization can manage employee access using your existing identity provider (IdP).

We currently support Google Workspace and Microsoft Entra ID (Azure).


Available on Enterprise plans.


You’ll complete a straightforward copy-and-paste setup between Simplebooklet and your identity provider.


What You’ll Need


Before beginning, make sure you have:


  • Admin access to your Simplebooklet Team Account


  • Admin access to Google Workspace or Microsoft Entra ID (Azure)


  • Permission to create or configure SAML applications in your IdP


Your organization is the tenant in this SAML setup.


Simplebooklet acts as the service provider (SP).



Option 1: Set Up SSO with Google Workspace


Step 1 — Open SAML Settings in Simplebooklet


  1. Open your Dashboard.


  1. Select Account → Team Account → SAML Settings.


(Direct link: https://simplebooklet.com/dashboard.php?pid=team-account-manage)


Keep this page open — you’ll return to it throughout setup.



Step 2 — Create a Custom SAML App in Google


  1. Go to admin.google.com


  1. Select Apps → Web and Mobile Apps


  1. Click Add App → Add Custom SAML App


  1. Name the app (for example: Simplebooklet SSO)



Step 3 — Copy Values FROM Google → TO Simplebooklet


Google will generate three values. Copy each one into your Simplebooklet SAML settings:


Google Value

Paste Into Simplebooklet

SSO URL

IDP SSO URL

Entity ID

IDP Entity ID

Certificate (x509 PEM)

IDP x509 Cert PEM


Your certificate must be pasted as plain text, including:


-----BEGIN CERTIFICATE-----


Next, complete the required tenant fields in Simplebooklet:


  • Tenant Name (e.g., Acme)


  • Tenant Display Name (e.g., Acme Services Limited)




Step 4 — Copy Values FROM Simplebooklet → TO Google


From Simplebooklet, copy:


Simplebooklet Value

Paste Into Google

ACS URL

ACS URL

Entity ID

Entity ID


Then click Continue → Finish in Google Admin.



Important: Enable User Access in Google Workspace


By default, new SAML apps in Google Workspace are turned off for all users.


After creating the Simplebooklet SAML app, you must explicitly enable access — otherwise sign-in will fail, even if all values are configured correctly.


To enable access:


  1. In Google Admin, open the Simplebooklet SAML app


  1. Go to User Access


  1. Set access to ON for:


  • Everyone


or


  • Specific groups or organizational units


  1. Click Save


If user access remains off, users will not be able to sign in to Simplebooklet using SSO.



Step 5 — Save Your Settings


Return to Simplebooklet and click Save.


Your Google SSO connection is now active.


Users granted access in Google Workspace will automatically become permission-controlled subaccounts under your Team Account.



Option 2: Set Up SSO with Microsoft Entra ID (Azure)


Step 1 — Open SAML Settings in Simplebooklet


  1. Open your Dashboard.


  1. Select Account → Team Account → SAML Settings.


(Direct link: https://simplebooklet.com/dashboard.php?pid=team-account-manage)


Keep this page open.



Step 2 — Create an Enterprise Application in Entra


  1. Go to Azure Portal → Microsoft Entra ID


  1. Select Enterprise Applications


  1. Click + New Application


  1. Choose Create your own application


  1. Name it (for example: Simplebooklet SSO)


  1. Select Integrate any other application you don’t find in the gallery (Non-gallery)


This creates a blank SAML application.



Step 3 — Enable SAML for the Entra App


  1. Open the new Enterprise Application


  1. Select Single sign-on


  1. Choose SAML


You’ll now copy values between Entra and Simplebooklet.



Step 4 — Copy Values FROM Simplebooklet → TO Entra


Simplebooklet Value

Paste Into Entra

ACS URL

Reply URL (ACS URL)

Entity ID

Identifier (Entity ID)



Step 5 — Copy Values FROM Entra → TO Simplebooklet


Entra Value

Paste Into Simplebooklet

Microsoft Entra Identifier

IDP Entity ID

Login URL

IDP SSO URL

Certificate (Base64 / PEM)

IDP x509 Cert PEM


How to Handle the Certificate


  1. Download the Base64 certificate from Entra


  1. This downloads a .pem file


  1. Open the file in a text editor


  1. Copy all text, including:


-----BEGIN CERTIFICATE-----
...certificate body...
-----END CERTIFICATE-----


  1. Paste it into IDP x509 Cert PEM in Simplebooklet



Step 6 — Save Your Settings


Click Save in Simplebooklet.


Your Microsoft Entra SSO connection is now active.


Users assigned to the SAML application in Entra will automatically become managed subaccounts inside your Team Account.



Notes & Best Practices


  • You only need to configure SSO once per organization


  • Access is fully controlled by your IdP


  • Add or remove users in Google Admin or Microsoft Entra, not in Simplebooklet


  • Only admins should access SAML settings


  • Certificates must be kept current


  • Regularly review who has access




Simplebooklet Logo for Application Dashboards


When adding Simplebooklet as a SAML application in your identity provider (Okta, Azure AD, Google Workspace, etc.), you may want to include our official logo so it displays correctly in your Application / SSO Dashboard.


Right click on the simplebooklet logo to download to your device, then upload to your identity provider's app icons option.


Simplebooklet Logo

The logo is a PNG file, with transparent background. It is 512px by 512px. It supports circular masking.


How This Logo Is Used


The logo appears:


  • In the employee App Launcher / My Apps page
  • On mobile SSO dashboards
  • In quick-access tiles inside your IdP


Using the official logo helps users quickly recognize Simplebooklet and reduces confusion during sign-in.

Updated on: 12/01/2026

Was this article helpful?

Share your feedback

Cancel

Thank you!