Velaxe
Enable enterprise SSO (SAML/OIDC) with role mapping | AccessGuard

AccessGuard

Enable enterprise SSO (SAML/OIDC) with role mapping

Connect your IdP and map group/claims to AccessGuard roles for least-privilege access.

SSO provider config
IdP mapping rules

Overview

Connect your IdP and map group/claims to AccessGuard roles for least-privilege access.

Problem

Multiple identity silos create offboarding gaps and manual role assignment errors.

Solution

AccessGuard integrates with Okta, Azure AD (Entra), Google Workspace, and Auth0 via SAML/OIDC with claims → role rules.

How it works

Add your IdP, paste OIDC creds or SAML metadata, then write mapping rules (e.g., group “platform-admins” → role admin). Optionally enable SCIM for lifecycle.

Who is this for

IT Admin Security Engineer Platform Lead

Expected outcomes

  • Centralized identity and access
  • Automatic least-privilege via claims mapping

Key metrics

Manual role changes

Baseline

120 per month

Target

10 per month

Orphaned accounts after offboarding

Baseline

7 count

Target

0 count

Gallery

SSO provider config
IdP mapping rules

Downloads & templates

Case studies

SaaSCo consolidates 3 IdPs

Unified SSO reduced access tickets by 78%.

Software Enterprise Global

Security impact

  • IdP identifiers, claims, roles · PII: business identity

Compliance

  • GDPR (controller/processor responsibilities)
  • SOC2 (logical access)

Availability & next steps

Pro Enterprise