

Centralized Authentication provides a global identity system for user authentication and management. Powered by Okta’s Auth0 platform, it offers secure workflows and innovative features to help clients confidently manage user authentication in their instances. Centralizing user authentication data reduces the burden on admins and provides users with a streamlined authentication experience across instances.
Centralized Authentication supports all types of user authentication, including password and single sign-on (SSO) methods. For SSO, it supports Security Assertion Markup Language (SAML) and OpenID Connect (OIDC).
Confirm your browser allows traffic to and from the new login page: login.relativity.one and *.auth0.com
System Admins can set up one or both of the following authentication providers:
The Authentication Provider page simplifies how you manage authentication providers and also supports creating and editing password providers. System administrators can configure SSO provider connections using the guided self-service wizard that walks them through configuring their Single Sign-On provider, including testing the connection at the end.
To setup your Authentication Provider, navigate to the Authentication Provider tab.
Grant access to the appropriate users or groups. If you're already using SSO with your Relativity instance, you don't need to reassign groups in your identity provider. If you're setting up SSO for the first time or need to update user or group assignments, follow the instructions provided. Then select Next to continue.
Test the Connection. Before you enable the connection, test it to confirm it's working correctly. Select Test Connection. A new window opens and prompts you to sign in to your identity provider—Okta, in this example. If you're already signed in, the test runs automatically without prompting you again.
Enable the Connection. After a successful test, select Enable Connection, then choose Proceed in the confirmation dialog. When the connection is enabled, close the dialog. You’ll return to the Authentication Provider page, where the new SSO provider appears in the list.
From the Authentication Provider tab, click the New Password Provider button and fill out the following fields:
This value is calculated per user account based on the date the user last reset their password.
Legacy Requirements | Centralized Authentication Requirements |
---|---|
Minimum character length – defined by customers (default 8) |
Minimum character length - defined by customers (default 10) |
4 of the 4 criteria:
|
3 of the 4 criteria:
|
AuthO's password policies follow modern standards that prioritize length rather than complexity.
Feature | Legacy | Centralized Authentication |
---|---|---|
Maximum character length |
X (default 50) |
X (default 128) |
Maximum failed password attempts before password reset required (Brute Force Protection) |
X |
X (non-configurable - 10 attempts) |
Maximum password age |
X (default no expiration) |
X (default 180 days) |
Maximum password history | X | X |
Disallow passwords in | X | |
Set password for user | X | Not supported given potential for account sharing. |
Suspicious IP Throttling | X | |
Breached Password Detection | X | |
Bot Protection (on specific workflows, such as password reset) |
X |
After you complete the password setup, you can start inviting users.
After you set up authentication providers, invite users to Centralized Authentication. You can invite users individually from their user record or in bulk from the Not Invited tab on the Centralized Authentication page.
The user receives an email invitation from support@relativity.one with the subject, "Welcome to Centralized Authentication in RelativityOne." See User accepts the invitation. Once invited, the user appears on the Pending Invitations list until they accept the invitation, at which point they move to the Accepted Invitations list within the tab for this specific password provider.
Administrators can track user transitions to Centralized Authentication and manage invitations directly from the Centralized Authentication tab. This overview helps you see which users are assigned to each authentication provider and monitor their progress.
Navigate to the Centralized Authentication tab, then choose the authentication provider you want to review. The information you see changes based on the provider type.
Status: View users in each category for the selected provider in the drop-down menu.
Eligible: Displays users not currently assigned to the provider. The list shows only enabled users and lets you filter by Artifact ID, Full Name, Email, or User Type.
Enrolled: Lists users who accepted the invitation to sign in with this provider. You can view details like Artifact ID, Full Name, Email, enrollment date, number of logins, last login date and time, and User Type.
Pending: Shows users who received an invitation but haven’t accepted it yet. The list displays Artifact ID, the Inviter’s name, the Invitee’s name, the invitation URL, when the invitation expires, and the creation date. Use the Invitation URL if a user can’t receive the invitation email.
If an invitation expires, select the user and choose Re-invite at the bottom of the screen to send a new invitation.
Status: View users in each category for the selected provider in the drop-down menu.
Eligible: Shows enabled users not assigned to this provider. You can filter by Artifact ID, Full Name, Email, or User Type.
Enrolled: Displays users who have authenticated with this identity provider. This list includes Artifact ID, Full Name, Email, enrollment date, number of logins, last login date and time, and User Type.
When the user receives the email invitation from support@relativity.one with the Subject, “Welcome to Centralized Authentication in RelativityOne,” they need to accept it.
Your organization will notice a slight change in the login process as Centralized Authentication rolls out to users.
Until all users in the instance have accepted the invitation, your organization will use both the legacy authentication and Centralized Authentication workflows. During this transition period, the user login process is as follows:
Once all users in the instance accept the invitation and your organization fully utilizes Centralized Authentication, the user login process will be as follows:
Why was this not helpful?
Check one that applies.
Thank you for your feedback.
Want to tell us more?
Great!