Configure Company Single Sign-On (SSO)

Admin users can learn how to enable secure authentication for your users with single sign-on (SSO) for connected Unite applications.

Written By Sara Mosher (Super Administrator)

Updated at March 25th, 2026

Single Sign-On (SSO) allows team members to sign in to net2phone using their corporate credentials instead of a separate username and password. SSO is configured at the organization level by adding user identity provider (IdP) details.

Requirements and notes 

To enable Single Sign-On, you must configure your organization’s identity provider in the Admin Settings portal.

You will need the following information from your identity provider:

  • Login URL
  • Logout URL (optional)
  • Entry ID
  • Public certificate
  • Certificate file upload

Once configured, users will authenticate using your organization’s identity provider credentials.

 

Step 1: Access SSO configuration settings

SSO settings are available in the Settings portal. Administrator users can enable or modify SSO configuration:

  1. Log in to the net2phone desktop or browser app with Admin credentials.
  2. Click your profile icon in the top right corner. 
  3. Click Admin Settings from the left navigation menu.
    You will be redirected to the Settings portal. 
  4. Select the Single Sign On page from the right navigation menu. 
Example: Settings portal open to the SSO page. 

Step 2: Add your Identity Provider

To enable SSO, provide the required identity provider information in the Single Sign-On section of the net2phone Settings portal.

Set Up Google as a Single Sign-On (SAML) Provider 

This article provides general SSO information that is applicable to all SAML providers. If your organization uses Google Workspace, you can refer to Set Up Google as a Single Sign-On (SAML) Provider for detailed steps.

 

Configuration Fields

You will need to use the following fields to connect net2phone to your identity provider.

  • Login URL
    The URL used by your identity provider to authenticate users.
  • Logout URL (Optional)
    The URL used to sign users out of your identity provider when they log out of net2phone.
  • Entity ID
    The unique identifier provided by your identity provider.
  • Public Certificate
    Paste or upload the public certificate issued by your identity provider.

Email Alias Authentication  

The following option allows additional flexibility in how users authenticate.

Allow email aliases to be configured on users
Allows users to authenticate using alternate email addresses associated with their account.

Enable this option only if your identity provider supports email aliases.

 

Step 4: Set your Assertion Consumer Service (ACS) endpoint

If your identity provider requires an ACS endpoint, use the following URL:

https://auth.net2phone.com/saml/login/callback


Step 5: Save or test configuration

After entering your SSO settings, use the following actions to validate or apply your configuration.

  • Submit – Saves your SSO configuration.
  • Cancel changes – Discards unsaved updates.
  • Test Configuration – Verifies your identity provider settings before enabling SSO.

Testing the configuration is strongly recommended before enabling SSO for all users.

Success: After SSO is enabled

Once SSO is enabled, the following behaviour applies across your organization.

  • Users sign in using their corporate credentials.
  • Password management is handled by the identity provider.
  • SSO applies across supported net2phone apps and services.

These changes take effect immediately after SSO is enabled.

 

 


Android App Behaviour with Single Sign-On (SSO)

To support Single Sign-On (SSO) on Android devices, net2phone updated the app signing method. As a result of this change, some users may be prompted to reinstall one or more net2phone apps after upgrading.

When Does This Occur?

This behaviour is expected and only occurs once after the update. Reinstallation prompts may appear after upgrading to:

net2phone Calling app version 1.2.3 or later

net2phone Huddle app version 1.0.6 or later

What Should Users Do?

If prompted:

  1. Uninstall the affected app(s) from the Android device.
  2. Reinstall the app(s) from the Google Play Store.
  3. Sign in again.

After reinstalling, signing in to one net2phone app will automatically sign the user into all net2phone apps on that device.