Skip to main content

Single Sign-On (SSO) Setup Guide

Step-by-step instructions for IT teams to configure SSO with dealhead using Microsoft Entra ID (OpenID Connect)

Updated over 3 weeks ago

dealhead supports Single Sign-On (SSO) for client organizations using your existing corporate identity provider. Once configured, your users access dealhead at app.dealhead.com and authenticate through your organization's standard login process — the same way they sign into your other corporate applications. If they are already authenticated in your corporate environment, access to dealhead can be automatic with no additional login required.

SSO is implemented using the OpenID Connect (OIDC) protocol, federating with your organization's Microsoft Entra ID tenant. Your identity provider handles authentication (verifying who the user is), while dealhead handles authorization (user roles, project access, and permissions) internally. dealhead does not store or manage passwords for SSO-enabled accounts.

⚠️ SSO Availability: Single Sign-On is included as part of dhConnect, dealhead's integration service that also includes Document Management System (DMS) connectivity. To learn more about dhConnect or to add it to your organization's subscription, contact [email protected]. Once your dhConnect subscription is active, the dealhead team will coordinate SSO onboarding with your IT team using this guide.

How It Works

Once SSO is enabled for your organization, the user experience is straightforward:

Step

What Happens

1

User navigates to app.dealhead.com

2

dealhead identifies the user's organization and redirects to your corporate login page

3

The user authenticates through your organization's standard login process, including MFA

4

Upon successful authentication, the user is returned to dealhead and their session begins

On a user's first SSO login, dealhead links their corporate identity with a dealhead account. A dealhead administrator within your organization then assigns appropriate roles and project access. All subsequent logins are seamless.

Users who are not part of an SSO-enabled organization continue to use standard username and password authentication at the same URL.

Security & Compliance

Shared Responsibility Model

SSO creates a shared security boundary between dealhead and your organization:

Responsibility

Owner

User authentication (identity verification)

Your organization's Entra ID tenant

Multi-factor authentication (MFA) enforcement

Your organization's Conditional Access policies

User authorization (roles, project access, permissions)

dealhead platform

Session management and token handling

dealhead platform

User provisioning and deprovisioning

Coordinated — see User Lifecycle below

MFA Requirement

dealhead requires that multi-factor authentication is enforced for all users accessing external SaaS applications. As part of SSO enablement, your organization will be asked to confirm in writing that MFA is enforced via Conditional Access or security defaults in your Entra ID tenant. This attestation is a prerequisite for enabling SSO.

User Lifecycle

When SSO is enabled, your organization controls the authentication boundary. If a user is disabled or removed from your Entra ID tenant, they will no longer be able to authenticate to dealhead. We recommend notifying dealhead when users leave the organization so that their dealhead roles and project access can be updated accordingly.

What We Need From Your IT Team

To enable SSO, your IT team will need to complete the following:

#

Action

Details

1

Confirm identity provider

Confirm that Microsoft Entra ID is your organization's primary identity provider for corporate authentication.

2

Register dealhead in your Entra ID tenant

Register dealhead as an enterprise application and grant admin consent. See Entra ID App Registration below for instructions.

3

Confirm MFA enforcement

Provide written confirmation that MFA is enforced via Conditional Access or security defaults for users accessing external SaaS applications.

4

Provide email domain(s)

Confirm your organization's primary email domain(s) (e.g., @yourfirm.com) that should be associated with SSO.

5

Designate a technical contact

Identify an IT contact for configuration coordination and testing.

6

Communicate to your users

Inform your users that dealhead is accessible at app.dealhead.com. No special URL is required — SSO routing is handled automatically. Optionally, you may add dealhead to your Entra ID My Apps panel, distribute as an intranet link, or add as a Teams tab.

Entra ID App Registration

To enable SSO, an IT administrator in your organization will need to register dealhead as a trusted application in your Entra ID tenant.

Step 1: Register the Application

Sign in to the Azure Portal and navigate to Microsoft Entra ID → App registrations → New registration.

  • Name: dealhead

  • Supported account types: Accounts in this organizational directory only (Single tenant)

  • Redirect URI: Web: [dealhead will provide the redirect URI during onboarding]

Click Register.

Step 2: Record Application Details

After registration, provide the following values to dealhead:

Value

Where to Find It

Application (client) ID

App registration → Overview

Directory (tenant) ID

App registration → Overview

Client secret

App registration → Certificates & secrets → New client secret

⚠️ Important: Please share these values securely. dealhead will provide a secure method for exchanging credentials during the onboarding process.

Step 3: Grant Admin Consent

Navigate to App registration → API permissions.

  • Confirm the following permissions are present: [dealhead will specify required permissions during onboarding]

  • Click Grant admin consent for [your organization]

Step 4: Configure Optional Claims (If Required)

Navigate to App registration → Token configuration → Add optional claim.

  • Token type: ID

  • Select: [dealhead will specify required claims during onboarding]

💡 Tip: If your organization uses a custom domain, restricts external application access through Conditional Access, or has specific network policies (IP allowlists, VPN requirements), please let us know so we can adjust the configuration accordingly.

Information We Need From You

To complete SSO configuration on our side, please provide:

  • Application (client) ID from the app registration

  • Directory (tenant) ID

  • Client secret value

  • Your organization's primary email domain(s) (e.g., @yourfirm.com)

  • Technical contact name and email for configuration and testing

  • Confirmation of MFA enforcement (written attestation)

  • Any network restrictions, IP allowlists, or Conditional Access policies that may affect external application access

Our implementation team will work with you to safely and securely communicate this information.

Testing & Go-Live

Once both sides are configured, dealhead will coordinate a testing window with your technical contact:

Test

What We Verify

SSO redirect

Users with your email domain are routed to your organization's login page

Authentication

Successful sign-in through your IdP, including MFA

Identity linking

Corporate identity is correctly linked to the user's dealhead account

Session behavior

Logout and re-authentication behave as expected

Access control

User roles and project permissions are correctly applied after SSO login

After successful testing, SSO is enabled for all users with your organization's email domain. Users can begin accessing dealhead immediately at app.dealhead.com.

Technical Summary

Component

Detail

SSO Protocol

OpenID Connect (OIDC)

Client Identity Provider

Microsoft Entra ID

Authentication

Delegated to your organization's Entra ID tenant

MFA

Enforced by your organization's Conditional Access policies

Authorization

Managed by dealhead (user roles, project access)

Login URL

Data Encryption

TLS 1.2+ in transit; AES-256 at rest

Frequently Asked Questions

Do our users need to create a separate dealhead account?

A: No. When SSO is enabled, your users authenticate with their existing corporate credentials. dealhead automatically links their corporate identity to a dealhead account on first login.

What happens if a user leaves our organization?

A: If a user is disabled or removed from your Entra ID tenant, they will no longer be able to authenticate to dealhead. We recommend notifying dealhead so their account permissions can be updated.

Do users need a special URL to access dealhead?

A: No. All users access dealhead at app.dealhead.com. The system automatically identifies SSO-enabled organizations and routes users to the appropriate login experience.

Is a VPN required to access dealhead?

A: No. dealhead is a cloud-hosted application accessible from any network. However, if your organization restricts access to external SaaS applications via Conditional Access policies (e.g., compliant device requirements, network location restrictions), those policies will apply when your users authenticate through your Entra ID tenant.

Can some users in our organization use SSO while others use password login?

A: SSO is enabled at the organization level based on email domain. All users with your organization's email domain will be routed through SSO. Users with personal or non-organizational email addresses will continue to use standard authentication.

Getting Support

For questions about SSO configuration or onboarding, contact [email protected].

Did this answer your question?