Passa al contenuto
Crea account
o
Accedi
Il logo della documentazione Stripe
/
Chiedi all'IA
Crea un account
Accedi
Inizia
Pagamenti
Ricavi
Per piattaforme e marketplace
Gestione del denaro
Risorse per sviluppatori
PanoramicaExplore all products
Start building
Avviare lo sviluppo
Informazioni sulle API
Creare con un LLM
Utilizza Stripe senza dover scrivere codice
Configura Stripe
Crea un account
    Panoramica
    Attiva il tuo account
    Aggiungi fondi al tuo saldo
    Lista di controllo dell'account
    Documenti di verifica accettabili
    Struttura dell'account
    Crea un team
    Organizations
    Account separati multipli
    Conti esterni collegati
    Impostazioni
    Branding
    Voci dell'estratto conto
    Dominio email personalizzato
    Dominio personalizzato
    Single Sign-On
      Configurare l'SSO
      Consolidare l'SSO
      Risolvere i problemi dell'SSO
      SCIM user provisioning
    Stripe Verified
Dashboard per il web
Dashboard per dispositivi mobili
Passare a Stripe
Pagina inizialeIniziaCreate an account

Nota

Questa pagina non è ancora disponibile in questa lingua. Stiamo lavorando alla preparazione della nostra documentazione in più lingue e ne forniremo una traduzione non appena disponibile.

Single sign-on (SSO)

Configure authentication for access to the Stripe Dashboard with an Identity Provider.

Single Sign-On (SSO) allows your team to sign in through an Identity Provider (IdP) using one set of credentials and access multiple applications, such as Stripe. Enabling SSO for your team increases security and makes it easier for them to sign in to Stripe. Stripe specifically supports Security Assertion Markup Language (SAML) 2.0, so your IdP can manage the creation of user accounts (team members) as well as authentication and authorization during sign-in. Any identity provider that supports SAML 2.0 works with Stripe.

Security incidents

If your Identity Provider (IdP) is compromised, unauthorized parties could access your Stripe account. You’re responsible for mitigating your exposure to security incidents by evaluating your security needs and implementing the necessary security protocols and controls.

Setup SSO with an Identity Provider

Auth0

Learn how to setup single sign-on in the Dashboard with Auth0.

Entra ID

Learn how to setup single sign-on in the Dashboard with Entra ID (formerly known as Azure AD).

Google Workspace

Learn how to setup single sign-on in the Dashboard with Google Workspace.

Okta

Learn how to setup single sign-on in the Dashboard with Okta.

OneLogin

Learn how to setup single sign-on in the Dashboard with OneLogin.

Other

Learn how to setup single sign-on in the Dashboard with a different identity provider.

Additional resources

Consolidate SSO

Learn how to consolidate single sign-on (SSO) settings across multiple accounts.

Troubleshoot SSO

Learn how to resolve failed configuration checks when setting up SSO.

Supported features

Stripe supports the following SSO features:

  • SSO configuration options: Configure Stripe accounts to either mandate SSO for all users or allow sign-in using SSO or email and password.
  • Just-In-Time account creation: Automatically create new Stripe accounts for users without existing access upon their first SSO sign-in.
  • Granular Dashboard roles: Assign granular user roles through your IdP.
  • IdP-initiated SSO: Authenticate directly from an IdP’s website or browser extension.
  • Service Provider-initiated SSO: Initiate SSO login directly from Stripe’s login page.
  • System for Cross-domain Identity Management (SCIM): SCIM is a protocol that an IdP can use to synchronize user identity lifecycle processes (for example, provisioning and deprovisioning access, and populating user details) with the service provider, such as Stripe.

Limitations

Stripe doesn’t support the following SSO features:

  • User Deletion in SAML: When users aren’t managed through SCIM, Stripe doesn’t receive immediate notifications if user access is revoked in IdP. If users attempt to log in through SSO after their session expires, Stripe revokes their access. To remove access immediately, you can delete users from your Team settings or enable SCIM user provisioning.
Questa pagina è stata utile?
SìNo
  • Hai bisogno di aiuto? Contatta l'assistenza clienti.
  • Partecipa al nostro programma di accesso anticipato.
  • Dai un'occhiata al nostro registro delle modifiche.
  • Domande? Contattaci.
  • LLM? Leggi llms.txt.
  • Realizzato da Markdoc