Overview
Spur uses Supabase Auth as its authentication provider, which enables secure OAuth 2.0-based SSO. Users can sign in to Spur using their existing Google Workspace credentials — no separate Spur password required.How SSO Works in Spur
Spur’s SSO uses the OAuth 2.0 / OpenID Connect (OIDC) protocol — the modern industry standard for federated authentication. Here’s the flow when a user signs in:Authenticate
The user authenticates with their Google credentials (and MFA, if configured by your organization).
What Spur Supports
| Item | Details |
|---|---|
| Protocol | OAuth 2.0 / OpenID Connect (OIDC) |
| Identity Provider | Google Workspace |
| Account types | Google Workspace accounts (organizational). Personal Gmail accounts are not supported — this is enforced by configuring the OAuth app’s user type to Internal in the Google Cloud Console. |
| User provisioning | Just-in-time — a Spur account is automatically created on first successful SSO login |
| MFA enforcement | Honored — if your Google Workspace requires MFA, it will be enforced before Spur grants access |
| Scopes requested | openid, email, profile (read-only identity data only) |
Current Limitations
The following are not supported at this time. If any of these are requirements for your organization, please reach out to discuss your use case.- SAML 2.0 — Spur uses OAuth 2.0/OIDC only, not SAML.
What Your Organization Needs to Do
For most organizations, no setup is required. Users can sign in with their Google Workspace account immediately.If Your Organization Restricts Third-Party App Access
Some organizations configure Google Workspace to restrict which third-party apps users can sign into. If this applies to your organization, a Google Workspace admin will need to:Open the Admin Console
Navigate to the Google Admin Console → Security → Access and data control → API controls.
Manage Third-Party App Access
Click Manage Third-Party App Access and find or add the Spur application.
Restricting Access to Specific Users or Groups
If you want to limit which employees in your organization can access Spur via SSO, a Google Workspace admin can:- In the Google Admin Console, navigate to the Spur app under API controls.
- Restrict the app to specific organizational units (OUs) or groups.
Data & Security
Spur requests the minimum necessary permissions to authenticate your users. Spur does not request access to Gmail, Google Drive, Calendar, or any other Google Workspace data.Scopes Spur Requests from Google
- openid — Required to use OpenID Connect for authentication
- email — The user’s email address, used as their Spur account identifier
- profile — Basic profile info (name), used to populate the user’s Spur profile
Questions?
If you have questions about SSO configuration, compliance requirements, or want to discuss your organization’s specific setup, please contact your Spur account representative.Contact Us
Reach out to the Spur team for SSO support.
