# JIT provisioning

Just-in-Time (JIT) provisioning automatically creates user accounts when users first authenticate through SAML-based single sign-on. This eliminates the need for administrators to manually pre-create accounts and ensures user information stays current with your identity provider.

# JIT provisioning behavior scenarios

Workato behaves differently depending on whether the user already exists in the workspace: When a user who doesn't exist in Workato signs in for the first time:

  • A new user account is created automatically
  • User name and email fields are populated from SAML attributes
  • User is granted access to JIT-enabled environments

When a user account already exists in Workato:

  • Workato doesn't update the user profile from SAML attributes
  • Existing permissions and group memberships are preserved
  • User is authenticated normally
flowchart TD A(User login event) -- Initiate authentication --> M(User authenticates <br/> through <br/> <strong> SAML-based SSO </strong>) M --> B{{Does the <br/> user exist in Workato?}} B -->|No| C(A new user account <br/> is created automatically) C --> D(User profile fields <br/> are populated from <br/> SAML attributes) D --> RR(User is granted <br/> access to JIT-enabled <br/> environments) B -->|Yes| E(User profile isn't <br/> updated from <br/> SAML attributes) E --> F(Existing permissions <br/> and group memberships <br/> are preserved) F --> G(User is <br/> authenticated normally) classDef default fill:#67eadd,stroke:#67eadd,stroke-width:2px,color:#000; classDef WorkatoBlue fill:#5159f6,stroke:#5159f6,stroke-width:2px,color:#fff; classDef SubgraphDash fill:#e1fffc,stroke:#f66,stroke-width:2px,color:#000,stroke-dasharray: 5 5 class A,M,E,F,G SubgraphDash class B WorkatoBlue

# Default user permissions

JIT-provisioned users receive the following default settings:

  • Account status: Active
  • Authentication method: SAML-based SSO (required)
  • Environment access: All environments where JIT provisioning is enabled
  • Group membership: SAML group memberships are synced on initial creation
  • Permissions: Based on the environment's default end-user permissions

# Enable JIT provisioning

You can configure Just-in-Time (JIT) provisioning and select which users require SAML-based authentication. You can customize authentication methods for each environment. For example:

  • Dev: Password auth
  • Test: SSO
  • Prod: SSO

Complete the following steps to configure SAML settings for your environment authentication:

1

Sign in to your Workato account and go to Workspace admin.

2

Click Authentication & Groups in the sidebar.

3

Select the environment you plan to configure. The environment End-user group page displays by default.

ENVIRONMENT AVAILABILITY

Workspaces without Environments provisioned only have one environment available.

4

Select the Authentication tab.

5

Ensure that the SAML-based SSO authentication toggle is enabled.

SAML toggleEnsure the SAML-based SSO authentication toggle is enabled

6

Go to the Select an identity provider (IdP) section and click + Set up new provider.

7

Provide a name for your IdP in the Identity provider (IdP) name field. For example: Okta Prod.

Configure SAML authenticatioConfigure SAML authentication

8

Use the Enforce SAML authentication for drop-down menu to select who is required to use SAML-based authentication.

9

Click the Enable SAML Just-in-Time (JIT) provisioning toggle to automatically create accounts for new users who sign in using SAML-based SSO.

AUTOMATED ACCOUNT ENVIRONMENT ACCESS

User accounts are created with access to the environments you selected in the preceding steps by default.

10

Click the Enable user groups syncing toggle to update user groups from your identity provider. Refer to User group syncing for more information.

USER GROUP SYNCING ONLY SUPPORTED BY WORKATO GO

User group syncing is only available in Workato GO. The sync process triggers when users log in. Slack and Microsoft Teams users remain authenticated through their platform sessions without re-login prompts, preventing the user group sync from triggering.

11

Click Next.

12

Copy the Specify Single sign-on URL and Service provider (SP) entity ID values and paste each value into your IdP to enable access to Workato-powered apps and services.

Copy the Specify Single sign-on URL and Service provider (SP) entity ID valuesCopy the Specify Single sign-on URL and Service provider (SP) entity ID values

13

Click Next.

14

Locate the Do you have your identity provider metadata URL? field and select Yes or No depending on whether you have access to your IdP metadata URL.

15

Click Set up.


Last updated: 2/5/2026, 11:48:05 PM