Single Sign-on (SSO) for LILT.com
For LILT platform customers, LILT supports Single Sign-On (SSO), allowing users to sign in to LILT using an identity provider other than LILT. Organizations can utilize SSO to simplify account management and reduce password fatigue.
Currently, a user account must pre-exist in the LILT system before SSO can be used to authenticate the user.
Google SSO
LILT Platform users can sign in via their Google account.
After being invited to join LILT by someone in your organization, you can create an account using Google Sign-On.
Users with existing LILT accounts that use traditional username/password sign in can access their accounts and all their data using Google Sign-On with an email address that matches their existing account. Users may use both sign-in methods interchangeably.
OpenID Connect
LILT will soon have functionality for OpenID SSO for platform customers, coming in 2025! With this new functionality customers can sign in through their organization’s SSO once configured via OpenID Connect (OIDC).
OpenID Connect is an interoperable authentication protocol based on the OAuth 2.0 framework of specifications (IETF RFC 6749 and 6750). It simplifies the way to verify the identity of users based on the authentication performed by an Authorization Server and to obtain user profile information in an interoperable and REST-like manner. OIDC can be leveraged through many identity providers such as Amazon, Microsoft, Okta, etc.
Microsoft SSO
LILT supports Microsoft authentication for platform customers. With this authentication service, customers using Active Director or Azure credentials can use their SSO for LILT.
To set up Microsoft SSO, a user from your org will need to log into LILT.com using Microsoft SSO and go through the consent page. You will then see the SSO app under Enterprise applications
in your Azure Active Directory (AD) or Azure Entra ID and have the ability to configure access controls.
To restrict access to certain users of your organization, click on the app as shown in the screenshot below and go to Manage > Properties. There, select Yes to
Assignment required
.After that, you’ll need to manually add users under Manage > Users and Groups. You can add either by granting access to a whole role, or just individual users.