Single Sign On Authentication
VT currently supports SSO authentication with the following services:
- GitHub
- Microsoft
This means, if you have an account in any of those services, you can use it at VT too!
Create a new VT account using SSO
When creating a new VT account, you can either create it in the traditional way by entering all your personal information or you can do it using SSO with any of the aforementioned services.
When choosing any SSO option, you’ll be asked to introduce a username to associate with your account:
After clicking on “Create account”, you’ll have a fully operational VT account. No need to confirm your email address or make any additional steps.
Login to an existing account using SSO
If you already have a VT account whose email address is also associated with an account at any of our supported SSO providers, you can login with that provider at VT too.
When login using SSO, no 2FA is necessary. If the login at the SSO provider is successful you’ll be automatically redirected to VirusTotal’s main page.
Group SSO settings
In the group settings page, a group administrator can choose among a set of already configured SSO identity providers: google.com, github.com and microsoft.com.
When any of these 3 providers is enabled for the group, all group users will be forced to authenticate exclusively through that provider. If no specific provider is enabled, users have the flexibility to sign in using either basic authentication (username and password) or SSO method if their account is linked to any of the listed services.
SAML
Clients with different identity providers can enable SAML for SSO by selecting that option in the drop-down menu and filling out the required details in the displayed form to complete the setup.
Please note that for forcing users to only authenticate via SAML, a checkbox is provided. If this checkbox is not selected, users can use both methods of authentication: SAML and common credentials.
We have articles with examples of how to configure SAML with Okta, configure SAML with Ping or configure SAML with EntraID
Please note that you must manually update rotated certificates in the SAML settings on the platform.
OIDC
Clients with other identity providers that prefer OIDC for SSO, can select that option in the drop-down menu and fill out the required data in the displayed form to complete the setup.
Again note that for forcing users to only authenticate via OIDC, a checkbox is provided. If this checkbox is not selected, users can use both methods of authentication: OIDC and common user/password credentials.
Updated 1 day ago