Skip to main content

Enabling Single Sign-On (SSO) After Initial Setup: Best Practice Guide

Many organizations start using Falcon with standard login methods and decide to introduce SSO at a later stage. When SSO is enabled retrospectively, it is important to understand how Falcon, the IdP, and the SSO modes interact.

Jonas Steeger avatar
Written by Jonas Steeger
Updated yesterday

Initial Situation

When SSO is introduced at a later stage, the following typically already exist:

  • active user accounts in Falcon

  • logins via username and password or social login

  • possibly external users or test accounts

SSO is therefore not enabled during the initial setup, but activated while the system is already in use.


Step 1: Prepare the Identity Provider

Before SSO is activated in Falcon, the selected Identity Provider must be properly configured (e.g. Microsoft Entra, Google Identity, Okta).

This includes, among other things:

  • registering Falcon as an application in the IdP

  • assigning users or groups

  • configuring security policies such as MFA

Important: The IdP determines who is allowed to log in via SSO. Falcon controls only how users authenticate.
A detailed overview of how to prepare the IdP can be found in the Help Center.


Step 2: Activate SSO in Falcon

Once the IdP has been prepared, SSO can be activated in Falcon. For the initial rollout, it is recommended not to select the mandatory mode right away.

Recommended starting point: “Optional” mode

In Optional mode, authentication remains flexible:

  • existing users can continue to log in using classic credentials

  • SSO can be tested in parallel

  • provider assignments can be changed or reset at any time

This mode is particularly suitable for validating the technical configuration and migrating the first users in a controlled manner.


Step 3: Assign existing users retrospectively

SSO in Falcon is user-based. Existing users must therefore be explicitly assigned to an Identity Provider.

The assignment is performed directly in Falcon’s User Management:

Owners and IT Admins can right-click an existing user to select and assign an Identity Provider. From that point on, the user account is linked to the chosen provider and the next login will take place via SSO.

To do this, open the user overview and select the users you want to assign to an IdP by checking the box on the left. Then use the right-click menu and choose Edit Identity Provider to assign the desired IdP.

This approach enables a gradual migration:

  • individual users or pilot groups can be migrated first

  • potential issues with the IdP configuration can be identified early

  • ongoing operations remain stable


Step 4: Switch to “Individual” mode (recommended)

Once it is clear that:

  • the IdP configuration is stable

  • the majority of users are successfully logging in via SSO

Falcon recommends switching to Individual mode.

In this mode:

  • new users must be assigned to a provider when invited

  • users can no longer reset their login on their own

  • IT Admins retain a controlled fallback option for exceptions

  • IT Admins can grant selected users (e.g. external users) access without SSO

This mode provides the best balance between security, control, and flexibility—especially when enabling SSO retrospectively.


Step 5: Mandatory – only with proven stability

The Mandatory mode enforces SSO for all users without exception. It should only be activated when:

  • all productive users reliably authenticate via SSO

  • no external or temporary access is required anymore

  • the IdP configuration is stable in the long term

⚠️ Warning:
In this mode, even IT Admins must always authenticate via the provider. A misconfiguration can result in a complete lockout. There is no technical fallback without support.


Special Case: Just-in-Time Provisioning (JIT)

Just-in-Time provisioning usually plays a minor role when SSO is enabled retrospectively, as users already exist.

JIT only applies if:

  • a user does not yet exist in Falcon

  • no invitation is present

  • the first login occurs directly via SSO

Note: If JIT is enabled, programs should be configured as protected. Otherwise, newly created users will see all public content after logging in.

Did this answer your question?