Set Up SAML Single Sign-On (SSO) for your Simplebooklet Team Account
Set Up SAML Single Sign-On (SSO) for Your Simplebooklet Team Account
Simplebooklet supports SAML-based Single Sign-On (SSO) so your organization can manage employee access using your existing identity provider (IdP).
We currently support Google Workspace and Microsoft Entra ID (Azure).
You’ll complete a straightforward copy-and-paste setup between Simplebooklet and your identity provider.
What You’ll Need
Before beginning, make sure you have:
- Admin access to your Simplebooklet Team Account
- Admin access to Google Workspace or Microsoft Entra ID (Azure)
- Permission to create or configure SAML applications in your IdP
Your organization is the tenant in this SAML setup.
Simplebooklet acts as the service provider (SP).
Option 1: Set Up SSO with Google Workspace
Step 1 — Open SAML Settings in Simplebooklet
- Open your Dashboard.
- Select Account → Team Account → SAML Settings.
(Direct link: https://simplebooklet.com/dashboard.php?pid=team-account-manage)
Keep this page open — you’ll return to it throughout setup.
Step 2 — Create a Custom SAML App in Google
- Go to admin.google.com
- Select Apps → Web and Mobile Apps
- Click Add App → Add Custom SAML App
- Name the app (for example: Simplebooklet SSO)
Step 3 — Copy Values FROM Google → TO Simplebooklet
Google will generate three values. Copy each one into your Simplebooklet SAML settings:
Google Value | Paste Into Simplebooklet |
|---|---|
SSO URL | IDP SSO URL |
Entity ID | IDP Entity ID |
Certificate (x509 PEM) | IDP x509 Cert PEM |
Your certificate must be pasted as plain text, including:
-----BEGIN CERTIFICATE-----
Next, complete the required tenant fields in Simplebooklet:
- Tenant Name (e.g., Acme)
- Tenant Display Name (e.g., Acme Services Limited)
- Tenant URL (e.g., https://acmeservices.com)
Step 4 — Copy Values FROM Simplebooklet → TO Google
From Simplebooklet, copy:
Simplebooklet Value | Paste Into Google |
|---|---|
ACS URL | ACS URL |
Entity ID | Entity ID |
Then click Continue → Finish in Google Admin.
Important: Enable User Access in Google Workspace
By default, new SAML apps in Google Workspace are turned off for all users.
After creating the Simplebooklet SAML app, you must explicitly enable access — otherwise sign-in will fail, even if all values are configured correctly.
To enable access:
- In Google Admin, open the Simplebooklet SAML app
- Go to User Access
- Set access to ON for:
- Everyone
or
- Specific groups or organizational units
- Click Save
Step 5 — Save Your Settings
Return to Simplebooklet and click Save.
Your Google SSO connection is now active.
Users granted access in Google Workspace will automatically become permission-controlled subaccounts under your Team Account.
Option 2: Set Up SSO with Microsoft Entra ID (Azure)
Step 1 — Open SAML Settings in Simplebooklet
- Open your Dashboard.
- Select Account → Team Account → SAML Settings.
(Direct link: https://simplebooklet.com/dashboard.php?pid=team-account-manage)
Keep this page open.
Step 2 — Create an Enterprise Application in Entra
- Go to Azure Portal → Microsoft Entra ID
- Select Enterprise Applications
- Click + New Application
- Choose Create your own application
- Name it (for example: Simplebooklet SSO)
- Select Integrate any other application you don’t find in the gallery (Non-gallery)
This creates a blank SAML application.
Step 3 — Enable SAML for the Entra App
- Open the new Enterprise Application
- Select Single sign-on
- Choose SAML
You’ll now copy values between Entra and Simplebooklet.
Step 4 — Copy Values FROM Simplebooklet → TO Entra
Simplebooklet Value | Paste Into Entra |
|---|---|
ACS URL | Reply URL (ACS URL) |
Entity ID | Identifier (Entity ID) |
Step 5 — Copy Values FROM Entra → TO Simplebooklet
Entra Value | Paste Into Simplebooklet |
|---|---|
Microsoft Entra Identifier | IDP Entity ID |
Login URL | IDP SSO URL |
Certificate (Base64 / PEM) | IDP x509 Cert PEM |
How to Handle the Certificate
- Download the Base64 certificate from Entra
- This downloads a
.pemfile
- Open the file in a text editor
- Copy all text, including:
-----BEGIN CERTIFICATE-----
...certificate body...
-----END CERTIFICATE-----
- Paste it into IDP x509 Cert PEM in Simplebooklet
Step 6 — Save Your Settings
Click Save in Simplebooklet.
Your Microsoft Entra SSO connection is now active.
Users assigned to the SAML application in Entra will automatically become managed subaccounts inside your Team Account.
Notes & Best Practices
- You only need to configure SSO once per organization
- Access is fully controlled by your IdP
- Add or remove users in Google Admin or Microsoft Entra, not in Simplebooklet
- Only admins should access SAML settings
- Certificates must be kept current
- Regularly review who has access
Simplebooklet Logo for Application Dashboards
When adding Simplebooklet as a SAML application in your identity provider (Okta, Azure AD, Google Workspace, etc.), you may want to include our official logo so it displays correctly in your Application / SSO Dashboard.
Right click on the simplebooklet logo to download to your device, then upload to your identity provider's app icons option.

The logo is a PNG file, with transparent background. It is 512px by 512px. It supports circular masking.
How This Logo Is Used
The logo appears:
- In the employee App Launcher / My Apps page
- On mobile SSO dashboards
- In quick-access tiles inside your IdP
Using the official logo helps users quickly recognize Simplebooklet and reduces confusion during sign-in.
Updated on: 12/01/2026
Thank you!