Skip to main content
All CollectionsIntegrationsSingle Sign-on
SSO (SingleSignOn) Information guide
SSO (SingleSignOn) Information guide

This article will help to understand SSO better and also provide technical information for IT departments.

Martin Walzak avatar
Written by Martin Walzak
Updated over a week ago

If you are experiencing issues with SSO or user access, please see our SSO Help Guide.

In this article:


What is SSO?

SSO stands for Single-Sign-on, a session and user authentication service that permits users to use one set of login credentials to access all of their SaaS applications. The user can sign into the LawVu application using the corporate username and password credentials.


What is SAML?

SAML is an extensible markup language (XML) standard that facilitates the exchange of user authentication and authorisation data across secure domains. SAML-based SSO services involve communications among the user (You), an identity provider (Client’s IT system) that maintains a user directory, and a service provider (LawVu).


What is SCIM?

System for Cross-domain Identity Management (SCIM) is a standard for automating the exchange of user identity information between identity domains, or IT systems. It’s specification is designed to make managing user identities in cloud-based applications and services easier. Once setup the SCIM endpoints on both sites can exchange information to create, read, update and delete users in the cloud application.


What is JIT?

Just in Time (JIT) Provisioning is a SAML protocol-based method that is used to create users the first time they log in to an application via an identity provider. This method can be used if SCIM is not available but there are certain limitations with JIT compared to SCIM.

Account automation (creation and removal) is not possible with JIT. In order to create an account, the user must successfully log in to LawVu. Additionally, the legal team administrator has the responsibility of disabling a user's account within the LawVu platform to prevent it from being assigned as a resource in the future. As long as the user's account remains active in LawVu, it can be assigned to contracts and matters.


Login Flows and prompts for email

Please note that there is a difference between the login initiated from the client’s system (identity provider) and the login initiated from the Lawvu login screen (service provider). The main difference between identity-provider-initiated SSO and service-provider-initiated SSO is where users start the login process. IdP-initiated login requests start in the identity provider (Office365/OKTA etc.), whereas SP-initiated login requests begin in the application users want to access.

If a user is already logged into their corporate identity provider (Office365, OKTA, etc.) and is presented with a list of application icons, then in most cases, no further login prompt will be presented to the client. The LawVu homepage will simply appear once selected.

If the user initiates the login from the LawVu login page (https://go.lawvu.com) they will be required to enter their email address, which triggers the system to forward the login request to their corporate identity provider (O365, OKTA, OneLogin, etc.).


Login Flows with multiple identity providers and MFA

The LawVu platform facilitates the configuration of multiple identity providers, where each configured domain directs users to the corresponding identity provider's login points. Any existing multi-factor authentication (MFA) details implemented by each provider will be utilised during the authentication process. The company's platform does not intervene with these MFA procedures; instead, it seamlessly hands over authentication to each domain's SAML authentication and their respective multi-factor authentication setups.


Supported SSO Standards

Our endpoints support:

SAML 2.0 for user authentication

SCIM 2.0 for user provisioning (automatic user creation, update and deactivation)

Auth0 is not supported for authentication with LawVu.

IMPORTANT: If you cannot achieve the automatic creation and deactivation of users in your LawVu account by utilising SCIM provisioning, our technical implementation team can assist by supporting Just in Time (JIT) user provisioning through SAML claims.

OKTA clients: Please ensure your OKTA instance includes the Lifecycle management license to support SCIM.


Supported SSO Providers

LawVu supports the below identity providers:

Identity Providers

SCIM

JIT

Native App

AzureAD

YES

YES

YES

OKTA

YES

YES

YES

OneLogin

YES

YES

in progress

Google

NO

YES

NO

JumpCloud

YES

not tested

NO

Sailpoint IIQ

YES

not tested

NO

ADFS

While we've had successful SSO configurations with clients using an on-prem ADFS server, we want to inform you that LawVu does not officially support ADFS. However, our team is more than willing to provide the necessary SAML details to your IT department for configuration and testing purposes.

Custom SSO solutions and in-house developments

We may be able to support custom solutions for clients provided they adhere to the industry standards of SAML2.0 and SCIM2.0.


Supported SSO Modes

Deactivated

In this mode, SSO is fully deactivated, and only LawVu platform accounts are permitted to log in, bypassing any SSO settings. If an account was previously synchronised and SSO is subsequently deactivated, the user must reset their password to access LawVu.

Hybrid

This mode enables both SSO and non-SSO accounts to log in. Accounts that have received an SSO flag through SCIM or Just-in-Time provisioning will trigger the SSO flow. Accounts without the flag will be prompted for a platform username and password.

Enforced

The enforced mode offers the highest level of security by requiring login through the configured identity provider. It is recommended after the configuration is finalized. Non-SSO accounts are locked out in this mode.


Security recommendations:

To increase security and avoid malicious access, every aspect of SSO implementation must be coupled with identity governance. LawVu recommends using two-factor authentication (2FA) or multifactor authentication (MFA) with SSO to improve security. Please talk to your IT to check if your organization can use or already uses 2FA/MFA.


Please be advised that the integration of Single Sign-On (SSO) entails the utilization of your company's identity provider for the administration of Multi-Factor Authentication (MFA/2FA), superseding the functionality of the LawVu platform in this regard.


Guide Library


Frequently Asked Questions

LawVu’s SSO technical capabilities are very flexible, and the below questions will help your I.T. team better understand the requirements and supported features.

Does LawVu support authentication through SAML 2.0 using an Identity Provider such as Okta/Azure/OneLogin?

Yes. LawVu provides support for popular identity providers such as AzureAD (Office365), OKTA, OneLogin, Google, Sailpoint, and JumpCloud. It's worth noting that LawVu's support is not restricted to the mentioned providers only, as any IDP that supports SAML2.0 and SCIM2.0 can be supported by LawVu.

OKTA clients: please ensure your OKTA license includes the Lifecycle management to utilize SCIM user provisioning.

Does LawVu provide instructions on how to configure SSO on the platform?

Yes, LawVu can provide guides for AzureAD, OKTA, OneLogin and a generic guide for compatible SAML & SCIM configurations.

Can the LawVu platform work in a mixed/hybrid mode allowing users to be able to sign in with and without SSO authentication?

Yes, LawVu has the capability to facilitate a hybrid/mixed configuration, which permits the utilisation of both Single Sign-On (SSO) and LawVu-stored usernames/passwords for authentication into the LawVu system. It's essential to note that configuring SSO in a hybrid mode is not advisable. However, there could be specific scenarios where hybrid access is necessary and requested by the client. Should such a situation arise, the technical team at LawVu can activate hybrid mode for your account.

Highlighting the security risk:

Opting for hybrid mode allows local accounts to log in while bypassing your SSO identity provider. It poses the risk of your IT department having no control over local LawVu users, resulting in two sources for user control access for your organisation. It's essential to highlight that LawVu does not oversee these accounts either. Once a local user account is created in LawVu, it remains active indefinitely even if the user leaves the organisation. The only way to prevent access is to manually deactivate the account in LawVu. Thus, the client’s LawVu administrator ensures that non-SSO accounts within LawVu are deactivated if not used.

Can we have external parties like outside counsel, contractors or consultants access our LawVu instance?

In this case, a hybrid mode approach may be required, but it is highly recommended to utilise our Vendor Spend Management in this situation to ensure the highest level of security and keep your Single Sign-On (SSO) enforced. By using the Vendor Spend Management, you will also have complete control over granting access to your individual matters and contracts to collaborate.

Highlighting the security risk:

Opting for hybrid mode allows local accounts to log in while bypassing your SSO identity provider. It poses the risk of your IT department having no control over local LawVu users, resulting in two sources for user control access for your organisation. It's essential to highlight that LawVu does not oversee these accounts either. Once a local user account is created in LawVu, it remains active indefinitely even if the user leaves the organisation. The only way to prevent access is to manually deactivate the account in LawVu. Thus, the client’s LawVu administrator ensures that non-SSO accounts within LawVu are deactivated if not used.

Does LawVu support SCIM 2.0 for user provisioning?

Yes, this standard is fully supported.

Can SSO be enforced so only SingleSignOn accounts can log in?

Yes, SSO can be enforced.

Does LawVu support MFA/2FA authentication?

Please be advised that the integration of Single Sign-On (SSO) entails the utilisation of your company's identity provider for the administration of Multi-Factor Authentication (MFA/2FA), superseding the functionality of the LawVu platform in this regard. Once SSO has been enabled, any MFA/2FA requests are handled by your identity provider and not the LawVu platform.

Does LawVu support permission-based role provisioning through SCIM?

Yes, LawVu supports role provisioning through AzureAD and OKTA.

LawVu can map four roles through provisioning. Please refer to our guide library below for instructions on mapping roles. With default permissions enabled, each role can also have a different set of permissions assigned to them. The four roles are:

Administrator

In House Legal

Contributor

Standard User

Please note that enabling SCIM role provisioning will disable the ability to change and assign roles within the LawVu platform. The legal team member with administrative access does this task manually in LawVu. Please liaise with your legal team and clarify how roles should be assigned in LawVu before configuring the next step.


Does LawVu support JIT (Just In Time) user provisioning through SAML claims?

Yes, this standard is supported. Please note that with JIT there are certain limitations. Even though it is possible to create users through JIT provisioning after a successful login, it is not possible to deactivate a user’s account in LawVu via JIT.


Obsolete accounts must be manually deactivated by the client's administrator within LawVu under the user management section. If this is delayed, there can be confusion. Once a user's account has been disabled by IT in the company's system, then login to LawVu will be denied. However, the person who left will still have an active account in LawVu and will also appear as an assignable resource under Matters and Contracts.

Does LawVu support multiple domains on the same Lawvu instance?

Yes, LawVu supports multiple login domains on the same account. Please ensure that, with SSO in place, all required domains are whitelisted by the LawVu technician.

Does LawVu support multiple identity providers under the same LawVu instance?

Yes, LawVu supports multiple IDPs under the same account. For instance, the LawVu team can configure user provisioning and login from Office365 and OKTA under the same LawVu account. This is sometimes required if the corporate organisation has multiple providers from different regions or if a mixed user login is needed after a merger.

Do I have to enter my email and password again to access LawVu?

That depends on the login flow. Please see the above paragraph about login flows.

Can I still manage users in LawVu with SSO in place?

No. Once SSO is implemented, all users are centrally managed by your organisation's IT team through a secure system, which ensures a single point of control over user access within your organisation.

Does the SSO login through the Outlook, Word, or Gmail addin require a different setup?

No, the SSO login process through Outlook or any other add-in is precisely the same as through the website or your identity provider.

Does LawVu support the service provider-initiated SSO login?

Yes, see above.

Does LawVu support the identity provider-initiated SSO login?

Yes, see above.


Does LawVu support the SSO http post-to-post binding method?

Yes.

Does LawVu support the SSO functionality of: Assertion signing and encryption?

Yes.

Does LawVu support the SSO functionality of: Response signing and encryption?

No.

Does LawVu support SHA-2 certificates?

Yes.

Does LawVu support Single LogOut supporting a LogOut URL?

No.

Which user attributes are supported through SCIM?

LawVu endpoints support the below user attributes.

username/email

name/givenname

familyname

phonenumber

title

department

Can additional attributes be added to the LawVu configuration?

No. Adding attributes is currently not supported.

Which JIT claims are required if SCIM is not availabe?

The following four claims are mandatory. If any one is missing the SAML request will fail.

It is required for the JIT process to uniquely identify the user account, which requires the uniqueID to be part of the SAML request so any changes to email or name can be accepted by our endpoint.

idP Attribute on provider site

SAML response attribute

FirstName

LastName

(unique identifier), this should be an attribute that is unique and immutable.

objectID (Azure) or user.id (OKTA)

username (NameID) (email format)

Please note that if the email is chosen as the unique identifier, there will be issues updating a user's account if that email changes in the future as this attribute is immutable in our database.

When does the application disable or revoke user access?

Once a user is removed from the client's identity provider SSO group through the utilisation of the SCIM protocol, they are marked for deactivation in Lawvu. Please note the above limitations if JIT is used, where a user cannot be deactivated in Lawvu.


Following de-provisioning or manual disabling of a user's account, are users retained within the system?

Users are maintained in the system to preserve a historical record of their participation in matters and/or contracts. However, they are deactivated to prevent future association with matters and/or contracts.


Reporting a problem

Before you report a problem, can you please check provided guides and help articles. If the issue continues, then please reach out to our support team.

Did this answer your question?