Skip to contentSkip to navigationSkip to topbar
On this page

Migrating from Legacy SSO for Twilio Console to new Self-Service SSO


(information)

Info

Single Sign-On for Twilio Console is available for customers with Twilio Enterprise Edition or Twilio Administration Edition(link takes you to an external page). For more information, please talk to sales(link takes you to an external page).


What is the new Self-Service SSO?

what-is-the-new-self-service-sso page anchor

We have launched a new SSO experience for Twilio Console which

  • provides a UI for you to manage your SSO connection with the Twilio Console
  • automates SSO enforcement for your users
  • and provides functionality to enable/disable SSO at the individual user level

For more details on the features of the new SSO, visit here.


Why should you migrate to the new SSO product?

why-should-you-migrate-to-the-new-sso-product page anchor
  • You will not need to create a support ticket for every new user that you need to enable SSO. That will be done automatically by the domain-level SSO enforcement feature.
  • You can set up and manage your SSO profile in a self-service manner so that you can perform routine tasks such as updating IdP signing certificates or auditing users' SSO status.

How to get access to the new Self-Service SSO for the Twilio Console?

how-to-get-access-to-the-new-self-service-sso-for-the-twilio-console page anchor

If you are an existing customer using the legacy SSO for Twilio Console, you can follow the below steps to get access to the self-service SSO product:

If you aren't using SSO for Twilio Console currently but are interested, please follow the pre-requisites specified here.


This guide covers the migration steps from the legacy sso for Twilio Console to the new Self-Service SSO.


Step 1: Create a new SSO Profile in the Twilio Admin

step-1-create-a-new-sso-profile-in-the-twilio-admin page anchor

Follow the SSO Configuration guides as per the Identity Provider system you are using to create an SSO profile and then test the SSO connection to make sure that it is working correctly.

  • We strongly recommend you create a new SAML App/Integration in your IdP rather than overwriting the existing one.
  • Do not enforce SSO for your domain at this step.

Step 2: Import all your existing users to your Organization

step-2-import-all-your-existing-users-to-your-organization page anchor

You can enforce SSO for only for the managed users in your Organization. Make sure that all the users who you want to enable SSO for are managed users in your Organization by doing the following:


Step 3: Reach out to Twilio Support for disabling the Legacy SSO for all the existing users

step-3-reach-out-to-twilio-support-for-disabling-the-legacy-sso-for-all-the-existing-users page anchor

Before your users can login using the the self-service SSO connection, you must remove the legacy SSO connection from your users authentication method for Twilio Console. In order to do this:

  • Reach out to Twilio Support or your Account Executive to get this done.
    • Share your Organization SID, list of the users, and the legacy SSO connection details (the IdentityProviderSID, which is of the format UIXXXX and can be found in the ACS URL of the legacy SSO metadata).

Step 4: Enforce SSO for the domain

step-4-enforce-sso-for-the-domain page anchor

Once you get the confirmation that legacy SSO has been removed from your users, you can now go to the Twilio Admin and enforce SSO for your domain.

Once you have enforced SSO on your domain, all the managed users from that domain will be routed to log in via the new SSO connection.


Step 5: Update the SAML app assignment for the users in your IdP

step-5-update-the-saml-app-assignment-for-the-users-in-your-idp page anchor

In your Identity Provider system, you need to assign the new SAML App/Integration that you created in Step 1 to your users so that they can use it to log in to the Twilio Console.

Once you have confirmation that your users are able to log in successfully, then you can proceed to remove the new older SAML App/Integration (that was configured for the legacy SSO) from existing users/groups.