Last Updated: October 10, 2025
Maptitude Online supports Single Sign-On (SSO) so your users can securely access Maptitude with their existing organizational credentials. This integration allows administrators to manage access centrally through your company’s identity provider (IdP) and eliminates the need for individual Maptitude Online usernames and passwords.
SSO is available for an additional annual fee per organization (not per user). For pricing, please contact sales@caliper.com.
This article will outline the required steps to setup single sign-on.
Table of Contents:
Step 1: Configure Enterprise Connection in Microsoft Entra ID
Step 2: Provide Metadata to the Maptitude Team
Step 3: Validate Your Connection
Step 4: Post-Setup & Monitoring
Supported Identity Providers
Maptitude Online supports the most common enterprise authentication standards, including:
- Microsoft Entra ID (formerly Azure AD)
- Okta
- Google Workspace
- Auth0 (used by Maptitude Online)
- Other SAML 2.0 and OIDC-compliant providers
These integrations cover nearly all organizational SSO scenarios.
Prerequisites
Before configuring SSO, ensure that:
- Your organization has an active Maptitude Online subscription.
- You have a Maptitude Online serial number issued by the Maptitude Team for your organization.
- You have administrator access to your IdP (e.g., Microsoft Entra, Okta, etc.).
- You’ve contacted the Maptitude Team to enable SSO for your organization.
Step 1: Configure Enterprise Connection in Microsoft Entra ID
- In the Microsoft Entra admin center, go to Entra ID → Enterprise applications → All applications.
- Search for Caliper Maptitude TransCAD SaaS in the gallery and connect to it or create a new non-gallery app.
- Assign users and groups who should have access to Maptitude Online.
- Enable OIDC ID tokens:
- Go to App registrations → your app → Authentication
- Under Platform configurations, add a Web platform
- Enable ID tokens under Implicit grant and hybrid flows
Step 2: Provide Metadata to the Maptitude Team
After configuring your enterprise application:
- Download your SAML metadata XML file or copy the OIDC discovery URL.
- Send this information to your Maptitude Online contact at sales@caliper.com to complete the linkage.
- The Maptitude Team will connect your IdP to your organization’s Maptitude Online account.
Setup typically takes a few hours to one business day, depending on your identity platform and internal approval process.
Step 3: Validate Your Connection
Once the Maptitude Team confirms configuration:
- Visit https://online.caliper.com
- Enter your email address, and click Login (password field will be hidden automatically)
- You will be redirected to your IdP’s sign-in page.
- After successful authentication, you’ll return to Maptitude Online with your account automatically linked.
During testing, the Maptitude Team verifies that:
- SSO redirects function correctly,
- Legacy data is visible after login (for linked accounts),
- No duplicate accounts are created.
Step 4: Post-Setup & Monitoring
After your SSO connection is live:
- The Maptitude Team performs health checks and monitors authentication logs.
- Your organization may schedule a post-go-live review to confirm access control and user synchronization.
- You can optionally enable group sync, MFA, and automatic provisioning for ongoing user management.
Security and Support
SSO enhances the security of your Maptitude Online deployment by leveraging your existing corporate authentication and MFA policies.
Maptitude Online supports SAML 2.0 and OIDC protocols for secure, token-based authentication.
If you encounter issues such as mismatched callback URLs or missing claims, Maptitude support can assist with troubleshooting and verification.
Auth0 Integration Notes
Since Maptitude Online uses Auth0, it supports:
- OIDC and SAML
- Integration with Okta and Google Workspace via Auth0
Troubleshooting Tips
| Issue | Solution |
| Redirect loop | Check callback URL and claims |
| Users not provisioned | Verify SCIM setup and group assignments |
| Login fails | Confirm ID token settings and metadata |
