Single Sign-On (SSO) allows users to securely access the SurveySensum platform using their existing organizational credentials, eliminating the need for separate usernames and passwords.
SurveySensum supports authentication through Google and Microsoft OAuth providers, enabling seamless and secure login experiences across platforms.
This guide explains the supported SSO methods, configuration requirements, setup steps, and onboarding process.
SurveySensum currently supports the following SSO authentication methods
SSO Type | Description | Managed By |
Google Public OAuth | Login using Google accounts | SurveySensum |
Microsoft Public OAuth | Login using Microsoft accounts | SurveySensum |
Microsoft Private/Internal OAuth | Login restricted to organization users within a Microsoft tenant | Client + SurveySensum |
SurveySensum maintains a centralized Google OAuth application for authentication.
Users can log in to SurveySensum using their Google accounts without requiring separate SurveySensum credentials.
To enable Google SSO:
The following scopes are requested during authentication:
openid
email
profile
SurveySensum also maintains a centralized Microsoft OAuth application for Microsoft account authentication.
Users can authenticate using their Microsoft accounts directly through the SurveySensum login page.
To enable Microsoft Public OAuth:
The following scopes are used:
openid
https://graph.microsoft.com/User.Read
offline_access
Microsoft Internal OAuth is designed for enterprise organizations that want authentication restricted to users within their own Microsoft tenant.
In this setup, the client manages their own Azure App Registration while SurveySensum configures the integration on the platform.
Clients must create an Azure App Registration and share the following details with the SurveySensum IT Team:
accountId
clientId
clientSecret
redirectUri
scopes
The following scopes are mandatory:
openid
https://graph.microsoft.com/User.Read
offline_access
Clients must configure the following Redirect URI in Azure Portal:
Replace {accountId} with the actual SurveySensum Account ID shared by the SurveySensum IT team.
Follow these steps to configure Microsoft Internal OAuth.
Log in to your Microsoft Azure Portal.
Go to:
Microsoft Entra ID → App Registrations
Click:
New Registration
Enter the required application details.
Choose:
Any Entra ID Tenant + Personal Microsoft Accounts
Add the SurveySensum Redirect URI provided earlier.
Navigate to:
API Permissions → Add Permission → Microsoft Graph → Delegated Permissions
Add:
User.Read
Create a new client secret and securely store the generated value.
Share the following securely with the SurveySensum IT Team:
To ensure secure SSO implementation, follow these best practices:
After configuration, the following rollout process is followed:
Verify:
Ensure the Redirect URI exactly matches the value configured in Azure Portal.
Confirm Microsoft Graph delegated permission User.Read is added and admin consent is granted if required.
For SSO onboarding, setup assistance, or troubleshooting, contact the SurveySensum IT Team with the following details:
Yes. Microsoft Internal OAuth allows organizations to use and manage their own Azure App Registration.
No. Authentication is securely handled through Microsoft OAuth providers.
Yes. MFA support depends on your Microsoft tenant configuration and security policies.
Yes. Access restrictions can be managed through your Microsoft tenant and organizational policies.