Unified SSO login and user management
Welcome note
Unified login is in the process of being applied to all users throughout September 2025.
Access the pre-existing documentation here: Administration.
This guide explains how users log in to Bloomreach via single sign-on (SSO), how roles are assigned during authentication, and how to manage user SSO access. Additionally, we will explain how to access your account when SSO login fails due to its misconfiguration.
Prerequisites
Before logging in with SSO and managing SSO access for your users, you must have:
- Configured SSO integration with your identity provider (Okta, Azure AD, or other).
- Set up SSO authentication for your identity provider (Okta, Azure AD, or other).
- Verified your domain for SSO access.
SSO login methods
Your users can log in to the Bloomreach platform with SSO using the following methods:
- Through the identity provider dashboard (for example, Okta).
- By clicking Continue with SAML SSO on the Bloomreach login page.
Existing users switching to SSO login
Existing users can switch to SSO authentication for accounts where SSO is enabled. If a user has access to multiple accounts on your instance and only one account has SSO enabled, SSO authentication will work only for that account. Settings in different accounts don't affect each other.
Emergency access
If the SSO login fails and you need to access the account to fix SSO issues, see the emergency access section.
Manage user access
Adding users
- Invite users to your Bloomreach organization first.
- Assign them to the SSO application in your identity provider.
- Users must log in to Bloomreach using SSO to authenticate.
- Once authenticated, users access the Bloomreach products according to their permissions.
External users
If you want internal users to authenticate with SSO while maintaining separate access for external partners or clients, enable the external access option in Bloomreach Administration. External users can then access the platform without requiring SSO authentication.
To determine which users can access SSO, refer to the Access Management article on identity domains and the process for verifying domain members.
Manage user roles
When SSO authorization is enabled, user role management depends on the user's last login method:
- For users whose last login method was SSO, you can manage roles only through the
role_mappingattribute. - For users whose last login method was email or Google, you can manage roles directly in the Bloomreach application.
Warning
If the user attempts to log in using SSO and no
role_mappingis received during login, the user won’t be allowed to log in.
Role assignment during login
When users log in through SSO, user roles are assigned automatically. Users gain their permissions based on the matched mapping role. For more information about role mapping setup, see the Azude AD or Okta SSO authorization articles.
Note
If a user role changes in the identity provider system, it’s automatically synced with Bloomreach. Users will receive the new role during the next SSO login.
Changing user roles
For users logged in using SSO, you can manage user roles through the identity provider or in Bloomreach:
- Changes made to the identity provider configuration enable you to assign different roles to specific users.
- Changing mapping roles in Bloomreach will affect all users associated with the mapping role.
Change user role for a single user (in your identity provider)
Update the role_mapping field value for a specific user in your identity provider. This affects individual users without impacting others in the same mapping role. Learn how to change the role_mapping in Azure AD or Okta SSO authorization guides.
Change user role for a group of users by modifying the mapping role (in Bloomreach)
- Go to Administration > Users > Mapping roles.
- Select the mapping role to modify.
- Update the assigned roles.
- Click Save.
User role will change for all users associated with the modified mapping role.
Role synchronization
- Role changes take effect during the next user login.
- Role propagation can take up to 60 seconds.
- Users must log out and log back in to receive updated permissions
Notes
- Custom roles work with SSO for granular access control.
- Product-specific permissions are managed within each application.
Emergency access for SSO Account Admins
If SSO configuration issues (incorrect role mapping, disabled SSO, or identity provider issues) prevent login, SSO account admins can request emergency access.
To request emergency access:
- Go to your Bloomreach instance URL and add
/recovery-accessat the end of the URL.
Example:https://app.exponea.com/recovery-access. - Check your email for a recovery link.
- Use the link to log in and fix SSO configuration issues.
This recovery mechanism ensures you can always regain access to fix authorization problems.
Updated about 6 hours ago
