Skip to main content
How Do I Enable SSO for My Mighty Network?
Updated over a week ago

The benefit of SSO is a unified member experience between a Mighty Network and your external website or service, and it moves member account management and profile settings externally.

For this reason, it’s also a feature that requires you to have an established external service and an experienced technical team to ensure everything works smoothly.

new SSO 2.png

The most important thing to keep in mind when you choose to enable SSO in your Mighty Network is that it will bypass and override all privacy options available on Mighty.

Only members with a valid login through your existing external website or setup will be able to access your entire community, and only a Sign In button will be visible on your Mighty Network’s landing page.

This also means that all of the posts and pages within your Mighty Network will not be publicly visible to non-members, and those pages will not be indexed by search engines.
In addition, enabling SSO will display an updated Terms of Use and email preferences popup for all members of your Network.

Ready to proceed? Please share this SSO implementation guide with your technical team.

Frequently-Asked Questions

Is there a way for my technical team to test the integration before enabling it on my main Mighty Network?

Yes, in fact we definitely recommend it. Full details are available in our SSO implementation guide.

What happens if I enable SSO, then decide later to disable it?
Disabling SSO will change your Mighty Network to Private, and member accounts created while SSO was enabled will need to sign in with a Magic Link, then set up a password.

What happens to SSO if I downgrade my Business plan?
Mighty Networks that downgrade will behave the same as Networks that disable SSO (as outlined above). SSO is not available on the free plan.

What happens if I get locked out of my Network?

After you have finished setting up SSO, you will receive a Host backdoor URL. You will be able to access your Network with that link if SSO is broken.

What if my members report frequently needing to sign in?

The likely cause is a missing refresh_token, or a refresh_token that expires too soon. Some SSO providers may also require an ‘offline_access’ scope (or similar) to allow us to keep your members logged in. As a best practice, we recommend extending your account session times (also known as the refresh token) to 30 days. This will ensure that when a member participates, they aren’t continually prompted for their account name and password.

Did this answer your question?