Skip to main content

How to set up Participant SSO

  • August 26, 2025
  • 0 comments
  • 464 views

Joel from Slido
Forum|alt.badge.img

Although there are many options for securing your slidos, setting up Participant single sign-on (SSO) offers the highest level of protection. This makes it so every participant joining your slido(s) must sign-in using your chosen SSO method.

 

Available with Enterprise, Webex and Institution annual plans, or Premium one-time plans

 

In this article:

 

 

Supported SSO methods

 

Slido supports the following SSO authentication methods for participants:

  • Google SSO - If you are using Google Suite at your company, participants can join slidos using their Google login credentials.
     
  • SAML based SSO - You can set up SSO protection for your participants with any IdP that supports SAMLv2.0. The steps in this guide cover all of the most popular identity providers such as Okta, OneLogin, Microsoft Entra ID (formerly called Microsoft Azure) or Auth0.
     
  • Webex SSO - If your company uses Webex, you can require participants to join using their Webex credentials.

 

 

Where to set up Participant SSO

 

To set up your Participant SSO, open up your Organization settings from your profile menu and select the Privacy tab.

 

Set up Participant SSO under Privacy tab of Org. settings

 

Keep in mind that if you enable Participant SSO for the whole organization, every slido will require participants to join via SSO by default. Members can disable this for individual slidos, unless the account owner locks the setting.

 

With SSO, your participants can be named or anonymous, depending on the participant privacy setting chosen by the host.

 

 

Set up Google SSO or Webex SSO for participants

 

After opening the Privacy tab of your Organization settings, follow the below steps:

  1. Find the Slidos section and change the method to Protected
  2. From the authentication method drop-down menu, select Google SSO or Webex SSO
  3. Enter your company domain and select Save
     
Set up Google SSO or Webex SSO for participants

 

Although the gif above shows Google SSO, the process is the exact same for Webex SSO.

 

 

Set up SAML-based SSO for participants

 

 

After opening the Privacy tab of your Organization settings, follow the below steps:

  1. Find the Slidos section and change the method to Protected
  2. From the authentication method drop-down menu, select SAML based SSO
  3. Upload your SAML XML file (metadata)
  4. Hit Save
Upload your SAML XML file for SAML Participant SSO

 

 

Need help creating your XML file?

The steps for creating an XML file will vary based on your identity provider (IdP). However, you can find these steps in our specific provisioning guides for OneLoginOktaMicrosoft Entra ID (formerly called Microsoft Azure), or Auth0.

 

If you need more assistance, please contact your IdP.

 

Changing the privacy settings

Only Slido admins and account owners can upload the SAML XML file into the organization settings. Once this is set on the organization level, end-users won’t be able to work with the SAML XML file anymore, as it will be automatically propagated from the organization settings.

 

Apply SAML SSO to all existing slidos (optional)

Slido admins and account owners can enforce SAML SSO on all slidos in the organization (including all past and future slidos), improving privacy for your organization.

 

Applying SAML SSO to all existing slidos

 

Applying Participant SSO to all slidos still allows hosts to disable this on an individual slido level. If you wish to enforce your Participant SSO for all slidos within your organization, choose the Lock settings option.

 

SAML SSO configuration details

Slido authentication process is based on the email as the unique user identifier. Here's the required NameID format:

 

urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress

 

Display name is based on the following SAML attributes in this order:

  • cn
  • displayName
  • name
  • firstName, lastName (both must be set), e.g. firstName=John and lastName=Doe then display name=John Doe
  • email (user part of email address), e.g. john.doe if the email was john.doe@email.com

 

​This information is included in Slido SAML metadata. You can download it directly from the Member SAML SSO tab under Organization settings. At the moment, the Organization or Company is not supported as a SAML attribute.

 

Download Slido SAML metadata

 

 

FAQs

 

Can participants still ask questions anonymously when there is SSO set up for the slido?

Yes! This helps to keep your data private without any compromise on the level of the audience engagement.

 

Learn more about making anonymous questions the default setting, as well as other Participant privacy options in our dedicated guide.

 

 

We usually use Slido for internal meetings, but there will be participants from outside the company at our upcoming event. Will they be able to engage via Slido?

Sure! Unless the Participant SSO option is locked on an organization level, you can disable the SSO login for a specific slido in its Settings > Privacy > Require authentication > Google/Webex/SAML SSO.

 

If the option to disable SSO login is grayed out, that means a license owner or admin has locked the requirement for your organization.

 

 

Can I test the participant SSO setup?

Slido does not provide any sandbox environment for testing. But you can always upload your XML file to a single slido and test with a colleague. Just create a testing slido and go to Settings > Privacy > Require authentication > SAML SSO. Then upload your XML file. Now you can have your colleague try joining the slido and test the experience.

 

 

 

 

Curious about more?