Authentication Setup Guide

Follow these steps to configure how your team members log in to Outdoo.


Before You Begin

Decide which login methods you want to allow:

  • Email & Password
  • Google / Microsoft
  • SAML (with your Identity Provider)

If using SAML:

  • Confirm you have admin access to your IdP (e.g., Azure AD, Okta).
  • Collect necessary metadata (URL or XML file).
  • Prepare your Outdoo-provided values (Entity ID and Reply URL).

Step 1: Enable Login Methods

Go to Company Settings โ†’ Authentication.

Choose allowed methods:

  • Email & Password
  • Google
  • Microsoft
  • SAML (requires setup below)

Step 2: Configure SAML (if applicable)

  1. In your Identity Provider (IdP) admin console, create a new SAML application.
    • Enter the following Outdoo details when prompted:
      • Entity ID
      • Reply URL (ACS URL)
    • Ensure you assign the users, teams, and groups correctly in your IdP SAML application
  2. Provide Outdoo with your IdP Metadata URL or upload the Metadata XML file:
  3. Configure the logout redirect URL in your IdP:

Step 3: Adjust Authentication Policies

Set the re-authentication interval (e.g., every 2 months).

Decide whether team members can update their own profile details.

Note: This does not affect call recording preferences. Users can always adjust their own recording settings if allowed at the user level.


 Step 4: Test Login

Log out of Outdoo.

Try logging in with each enabled method.

Confirm that SAML redirects correctly to your IdP and back to Outdoo.


๐ŸŽ‰ Step 5: Roll Out to Your Team

Share login instructions with your team.

Encourage them to test and confirm access.

Monitor the first login attempts to ensure everything works smoothly.


๐Ÿ‘‰ Pro Tip: If youโ€™re switching from Email & Password to SAML-only login, make sure at least one admin account is already SAML-enabled before disabling password login. This prevents lockout.

Was this article helpful?