This article outlines the full process of setting up Single Sign-On (SSO) for Momenta journeys. SSO allows participants to log in using their organization’s credentials without needing to create a new password, improving security and user experience.
What Is SSO?
SSO (Single Sign-On) allows participants to access Momenta using their organization’s credentials. Instead of creating a separate login, they authenticate through their corporate identity provider (e.g., OneLogin, Okta, Microsoft Azure).
This is typically done during the same phase as platform approval but may proceed in parallel.
Who Sets It Up?
BTS Contacts
- NAM: Jonathan Chen
- EUR: Trina Sarkar
- MOW: (TBD)
Client-Side Contacts
- InfoSec or IT contact who manages their SSO provider
- They will configure certificates, metadata, and SSO attributes
- They will also test and troubleshoot access during setup
SSO Setup Process
- Project Lead confirms that SSO is required (included in the Journey Build Form)
- Introduce BTS SSO Setup contact to the client IT team
- BTS SSO contact gathers required info from the client:
- SSO metadata
- Certificates
- User attribute mappings
- BTS updates configuration inside the Client Collection in Momenta
- BTS sets up an AWS S3 folder and preps the login setup
- Share configuration back to client IT for their SSO platform
- Conduct live testing with both sides involved
- Confirm readiness with project team
- Journey builder sets the login page
Understanding SSO Login Options
The way SSO is configured affects user creation, login, and self-registration capabilities. There are three main flows:
Open Flow (Preferred)
- All users in the client org can access Momenta via SSO
- BTS manages content access, not the client
- Best for large rollouts or self-registration setups
Restricted SSO (Not Preferred)
- Client controls who can log in to Momenta
- Limits flexibility for cohort expansion or self-registration
Restricted + Journey-Specific (Avoid)
- Separate SSO config for each journey
- High maintenance and risk of user confusion
Participant Experience
- Participants visit:
https://clientname.btsmomenta.com
- They are redirected to the client’s SSO page
- After logging in, they land on their journey homepage
- If they are in multiple journeys, they choose one from a dropdown
Optional: Cohort-Based Self-Registration
- You can configure a unique link per cohort that:
- Creates the user upon first access
- Auto-enrolls them into a specific cohort
- Be cautious with multiple programs — misdirected users are difficult to correct later
Preferred vs. Sub-Optimal Flows
Preferred Flow: Open SSO Access
All users in the client org can access Momenta. BTS manages which journeys or cohorts they are assigned to.
Avoid These Flows:
- Client restricts login access within their SSO tool
- Each journey has a separate SSO config (high friction)
Reminder: This is not the same as platform approval. You may need InfoSec clearance before starting, but setup can run in parallel.
Visual Aids
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article