Login with SSO FAQs

Category: Login with SSO
On this page:

    This article contains Frequently Asked Questions (FAQs) regarding Login with SSO.

    For more high-level information about Login with SSO, refer to About Login with SSO

    Using Login with SSO

    Q: Why does Login with SSO require my Master Password?

    A: Login with SSO allows your employees to use your existing Identity Provider (IdP) to authenticate their identities (i.e. prove they are who they say they are). What makes Login with SSO unique compared to other tools is that it retains our end-to-end zero-knowledge encryption model. Nobody at Bitwarden should have access to your Vault data and, importantly, neither should your Identity Provider.

    That’s why the Bitwarden Login with SSO offering decouples authentication and decryption. Your IdP can confirm that Alice is, in fact, Alice, but cannot and should not have the tools to decrypt Alice’s Vault. Only Alice can have that tool and, conveniently, it’s her Master Password!

    In practice, that means that anytime an employee logs in to Bitwarden using SSO, they’ll need to use their Master Password to decrypt their Vault, protecting your businesses’ critical credentials and secrets.

    Note

    Organizations self-hosting Bitwarden can leverage Key Connector to server decryption keys to Bitwarden clients instead of requiring users to decrypt Vault data with their Master Passwords. Learn more here and here.

    Q: Will changing my SSO password affect my Bitwarden Master Password?

    A: No, your Master Password will remain the same. Unless your Organization is using Key Connector to self-host decryption keys, your Master Password must be used to decrypt Vault data.

    Q: Does SSO authentication replace my Master Password and Email?

    A: No. Login with SSO leverages your existing Identity Provider (IdP) to authenticate you into Bitwarden, however your Master Password and Email must still be entered in order to decrypt your Vault data unless your Organization is using Key Connector to self-host decryption keys.

    Q: Can I still log in with my Master Password if my Organization has SSO enabled?

    A: By default, yes, you can use your email address and Master Password to login to Bitwarden. However, if your Organization enables both the Single Organization and Single Sign-On Authentication policies, or if your Organization users uses Key Connector, all non-administrator users will be required to login with SSO.

    Q: How does Login with SSO work for new users (“just-in-time”)?

    A: New users who log into their Organization using Login with SSO will be placed in the Accepted status of their Organization until they are confirmed by an administrator. When that user is assigned to a Group manually or via the Bitwarden Directory Connector, they will receive access to the appropriate shared items.

    Q: Do I still need to use Bitwarden Directory Connector?

    A: If you manage your Bitwarden Group and Collection assignments directly within Bitwarden, there is no need to leverage the Directory Connector. However, if you would like to have Groups and users automatically synchronized with your organizations directory, we recommend using Login with SSO in conjunction with Directory Connector for the most complete solution.

    Q: Do I need to enter my Organization Identifier every time I login?

    A: Nope! Bookmarking the Enterprise Single Sign-On page with your Organization Identifier included as a query string will save you the trouble of entering it each time. For example:

    • https://vault.bitwarden.com/#/sso?identifier=your-org-id for Cloud-hosted instances
    • https://your.domain.com/#/sso?identifier=your-org-id for Self-hosted instances

    Q: How do I change pre-generated SSO configuration values?

    A: Pre-generated SSO configuration values including SP Entity ID, SAML 2.0 Metadata URL, ACS URL, and Callback Path can be changed in self-hosted environments by changing the url: value in .bwdata/config.yml and running the ./bitwarden.sh rebuild command to apply your change.

    Security

    Q: How does Login with SSO work with the zero-knowledge model?

    A: Bitwarden Login with SSO & Master Password only performs user authentication and does not decrypt user data. Adding SSO functionality does not introduce any further individually identifiable information into the Bitwarden database.

    Billing

    Q: What plans offer Login with SSO?

    A: Only our current Enterprise Plan offers this feature. For more information, see here.

    Q: How do I upgrade my plan so that I can use Login with SSO?

    A: Contact Us and select Upgrade/Change Plan from the Subject dropdown menu. We highly recommend you test Login with SSO by starting a 7 Day Enterprise Free Trial.

    Q: I would like to test Login with SSO. If I decide I don’t need it, can I revert to my Classic 2019 plan?

    A: Unfortunately, we aren’t able to revert you back to a Classic 2019 plan once you’ve upgraded. We recommend creating a new Organization to start a 7 Day Enterprise Free Trial to test Login with SSO outside of your Primary Organization.

    Supportability

    Q: Does Bitwarden support OAuth 2.0?

    A: Bitwarden supports OpenID Connect, but does not support OAuth at this time.

    Q: Will Login with SSO work with a self-hosted instance of Bitwarden?

    A: Yes! Login with SSO will work with self-hosted instances regardless of whether they are on-premises or in your own cloud, as long as your Identity Server is reachable from the instance.

    Q: Does Login with SSO work across hybrid cloud environments?

    A: Yes! Login with SSO only requires the ability to connect to your Identity Provider from your instance of Bitwarden. It can be used with Cloud or on-premises Identity providers, as well as Cloud or self-hosted Bitwarden instances.

    Q: If my Identity Provider is offline, can users user Login with SSO to authenticate into Bitwarden?

    A: If your Identity Provider is offline, users must log in using their email and Master Password. This may change in the future as we enable further authentication control mechanisms for Organizations.