Yield.xyz SSO Setup Guide

Enable Single Sign-On (SSO) to let your team sign in to the Yield.xyz dashboard through your identity provider.

📘

Why set up SSO?

  • One less credential to manage: Team members sign in with the same account they use for everything else.
  • Instant offboarding: When someone leaves your organization, removing them from your identity provider immediately revokes their Yield.xyz access.
  • Centralized access control: Manage who can access Yield.xyz from your identity provider.

Yield.xyz supports two protocols: OIDC (OpenID Connect) and SAML 2.0. Below are the two step-by-step guides for each option:

  • Option A: OIDC — simpler setup, works with Google Workspace, Okta, Azure AD, and others.
  • Option B: SAML 2.0 — for organizations that require SAML.

Prerequisites

Before starting, make sure you have:

  • Admin access to your identity provider — Google Workspace Admin, Okta Admin, Azure AD Global Admin, etc.
  • Yield.xyz Dashboard Admin role — you need admin or superAdmin permissions on your Yield.xyz team.
  • Google Workspace (if using Google as your IdP)

Option A: OIDC

OIDC is the recommended protocol. It's simpler to configure and works with any provider that supports OpenID Connect — Google Workspace, Okta, Azure AD (Entra ID), OneLogin, Auth0, and others.

This guide uses Google Workspace as the example. The steps are equivalent for other providers.

Step 1 — Copy the Redirect URI from Yield.xyz

  1. Log in to the Yield.xyz dashboard as an admin.

  2. Go to Settings

    Settings navigation
  3. In the Single Sign-On section, click on Step 2 and make sure to select OIDC.

    Select OIDC protocol
  4. Copy the Redirect URI shown at the top of the form.

    Redirect URI

The Redirect URI will look like: https://api.stakek.it/v1/auth/sso/callback/oidc

Step 2 — Create an OAuth Client in Google Cloud

  1. Go to Google Cloud Console → APIs & Credentials.
  2. Select your organization's project (or create a new one).
  3. If you haven't set up the OAuth consent screen yet:
    • Click OAuth consent screen in the sidebar.
    • Choose Internal to restrict access to your organization's users only.
    • Fill in the app name and support email, then save.
  4. Click + CREATE CREDENTIALSOAuth client ID.
  5. Application type: Web application.
  6. Name: e.g. "Yield.xyz Dashboard SSO".
  7. Under Authorized redirect URIs, click + ADD URI and paste the Redirect URI from Step 1.
  8. Click CREATE.
  9. A dialog will show your Client ID and Client Secret. Copy both.

Keep the Client Secret safe. Google only shows it once in this dialog. Yield.xyz encrypts it at rest, but treat it like a password. If compromised, rotate it in Google Cloud Console and update it in Yield.xyz.

Step 3 — Enter credentials in Yield.xyz

Back in the Yield.xyz SSO settings page, fill in:

FieldValueRequirement
Issuer URLhttps://accounts.google.comRequired
Client IDPaste from Google Cloud ConsoleRequired
Client SecretPaste from Google Cloud ConsoleRequired
EnabledToggle onRequired
EnforcedLeave off initially (see Step 5)Optional

Click Save.

Attribute mapping (optional): Click "Show attribute mapping" to customize how user attributes are mapped. The defaults work out of the box for Google Workspace. Only change them if your provider uses non-standard claim names for email, first name, or last name.

Step 4 — Test the login

  1. Log out of the Yield.xyz dashboard.
  2. On the login page, click Sign in with SSO.
  3. Enter your email address.
  4. You'll be redirected to Google's login screen.
  5. Authenticate with your Google Workspace account.
  6. You'll be redirected back to Yield.xyz, logged in.

Step 5 — Enforce SSO (optional)

Once SSO is working for your team, you can enforce it to make it the only login method:

  • Email code login is disabled for all team members.
  • Everyone must authenticate through your identity provider.
  • Removing a user from your identity provider immediately revokes their Yield.xyz access — no separate offboarding step.

To enable: toggle Enforced on in the SSO settings and click Save.

Before enforcing: Confirm all team members can sign in via SSO first. Once enforced, the email code login stops working for everyone on your team. If you need temporary access for external collaborators, either keep enforcement off or add them as external users in your identity provider.


Option B: SAML 2.0

SAML SSO works with any SAML 2.0-compliant identity provider — Google Workspace, Azure AD (Entra ID), Okta, OneLogin, and others.

The Yield.xyz dashboard walks you through the 3-steps.

How SAML SSO works

SAML involves two parties exchanging information about your users:

  • Identity Provider (IdP) — your system (Google, Azure AD, Okta, etc.) that authenticates users.
  • Service Provider (SP) — Yield.xyz, which receives the authentication result.

You'll configure each side with the other's metadata.

Step 1 — Register Yield.xyz in your Identity Provider

  1. Log in to the Yield.xyz dashboard as an admin.

  2. Go to Settings → Single Sign-On.

  3. Select SAML as the protocol.

    Select SAML protocol
  4. The wizard shows Step 1 of 3: Register with your Identity Provider.

  5. Copy the two values under Service Provider details:

Yield.xyz fieldWhat to enter in your IdP
ACS URL (Callback URL)Paste into your IdP's Single sign-on URL, Reply URL, or ACS URL field
Entity ID (SP Issuer)Paste into your IdP's Audience URI, Identifier, or Entity ID field

The dashboard also includes collapsible setup guides for Google Workspace, Okta, and Azure AD (Entra ID) directly on this page. Expand the relevant one for step-by-step instructions specific to your provider.

Once you've registered Yield.xyz in your identity provider, click "I've registered this — Next".

Step 2 — Enter your IdP details in Yield.xyz

The wizard moves to Step 2 of 3: Enter your IdP details. Copy these values from your identity provider's SAML configuration page:

FieldWhere to find itRequirement
Issuer URL (IdP Entity ID)Your IdP's Entity ID or Issuer URLRequired
Entry Point (IdP SSO URL)Your IdP's SSO URL, Login URL, or SAML EndpointRequired
IdP CertificateYour IdP's X.509 signing certificate in PEM formatRequired

Click Next to proceed.

Step 3 — Enable and save

In the final step, toggle Enabled on and click Save.

Leave Enforced off for now — you can turn it on after you've confirmed SSO works.

Step 4 — Test the login

  1. Log out of the Yield.xyz dashboard.
  2. On the login page, click Sign in with SSO.
  3. Enter your email address.
  4. You'll be redirected to your identity provider's login page.
  5. Authenticate with your credentials.
  6. Your IdP sends a SAML assertion back to Yield.xyz, and you'll be logged in.

Users must be invited first. Before a team member can sign in via SSO, an admin must invite them from the Yield.xyz dashboard team management page. Uninvited users will not be able to log in even if they exist in your identity provider.

Step 5 — Enforce SSO (optional)

Once SSO is working, you can enforce it to make it the only login method:

  • Email code login is disabled for all team members.
  • Everyone must authenticate through your identity provider.
  • Deactivating a user in your IdP immediately revokes their Yield.xyz access — no separate offboarding step.

To enable: go to Settings → Single Sign-On, toggle Enforced on, and save.

Before enforcing: Confirm all team members can sign in via SSO first. Once enforced, email code login stops working for everyone on your team. If you need temporary access for external collaborators, either keep enforcement off or add them as external users in your identity provider.


Important notes

Email is the unique identifier

  • The email from your identity provider must match the email on the Yield.xyz account exactly.
  • For SAML: ensure your IdP sends the email address as the NameID — not an opaque user ID.
  • Each email can only belong to one team. If a user already has a Yield.xyz account on another team, SSO login will fail. Please contact Yield.xyz team.

Controlling who has access

  • The users must be invited by an admin from the Yield.xyz dashboard before they can sign in via SSO. Automatic account creation for SSO users is coming soon.
  • For OIDC with Google: setting the consent screen to Internal restricts access to your organization by default.
  • For SAML: assign users/groups to the SAML application in your IdP.
  • External collaborators can be added as external or guest users in your IdP if needed.
  • When a team member leaves, removing them from your IdP immediately blocks their Yield.xyz access (when SSO is enforced).