Skip to main content

Configure Intelligent Discovery

Intelligent Discovery automatically routes users to the correct authentication provider based on their identifier (email or username). This is the recommended mode for most deployments, especially B2B and multi-tenant environments.

Prerequisites

  • Access to SecureAuth Connect
  • At least one identity provider configured in your workspace
  • Email domains or user directory set up for matching

How Intelligent Discovery works

  1. User enters their identifier (email or username)
  2. SecureAuth Connect checks configured rules (email domains, user lookup)
  3. System displays matching providers
  4. If exactly one provider matches and instant redirect is enabled, user is automatically logged in
  5. If multiple providers match, user sees a list to select from
  6. If no providers match and a fallback provider is configured, the fallback is displayed

Enable Intelligent Discovery

  1. In SecureAuth Connect, go to Authentication > Providers.

  2. Click the Discovery tab.

  3. Select the Intelligent Discovery option.

    Authentication > Providers, Discovery tab showing Intelligent Discovery option selected

Step 1: Configure email domain-based discovery

Email domain discovery is the most straightforward method. You configure which email domains map to which providers.

Add email domains to a provider

  1. From the Intelligent Discovery view, locate the provider you want to configure.

  2. Click the provider row or the three-dot menu and select Edit

  3. Under Email domain based discovery, enter the email domains that map to this provider.

    • Enter one domain per line (example: gmail.com, company.com)

    • Press Enter after each domain to add it

      Edit provider configuration showing email domains field with "gmail.com" entered

  4. Save your changes.

How it works

When a user enters an identifier ending with one of your configured domains, this provider is automatically matched. For example:

  • If you configure gmail.com for the Google provider
  • And a user enters johndoe@gmail.com
  • Google is automatically presented or used based on other discovery settings

Best practices

  • Use domains you own or manage
  • Map corporate domains to enterprise providers (Azure AD, Okta, etc.)
  • Map social domains to social providers (gmail.com to Google, icloud.com to Apple)
  • Avoid duplicate domains across providers - each domain should map to only one provider

Step 2: Enable user record lookup

User record lookup allows the system to search your organization's user directory to determine which provider a user belongs to. This is useful when users have multiple email domains or when you can't predict all domains in advance.

  1. From the Edit provider page, scroll to User record based discovery.
  2. Select the User record lookup check box.
  3. Save your changes.

How it works

When a user enters their identifier, SecureAuth Connect checks if that user exists in your directory. If found, the provider is presented as an option.

When to use

  • Customers using many different email domains
  • Directory-based matching instead of domain-only detection
  • You want safer discovery than domain-only detection
  • Multi-tenant environments where users from different organizations have different domains

Best practices

  • Enable for at least one provider to serve as a fallback lookup
  • Test with various user identifiers to ensure matching works correctly
  • Combine with email domain matching for best results

Step 3: Configure "Visible use by default"

This option ensures a provider is always visible on the login page during initial load, even before the user enters their identifier.

  1. From the Edit provider page, scroll to Other options.
  2. Select the Visible use by default check box.
  3. Save your changes.

When to use

  • Local authentication (users stored in SecureAuth Connect identity pool)
  • Social login providers that should always be available
  • Backup providers for users whose identifiers don't match any discovery rules

Best practices

  • Enable for 1-2 providers maximum to avoid cluttering the login page
  • Combine with fallback provider for comprehensive coverage

Step 4: Enable instant redirect (optional)

Instant redirect automatically routes users when only one provider matches their identifier, eliminating an extra click.

  1. From the Edit provider page, under Other options, select the Instant redirect check box.
  2. Save your changes.

How it works

  • User enters their identifier
  • Discovery identifies exactly one matching provider
  • User is immediately redirected to that provider
  • User never sees a provider selection page

Example scenario

A user enters johndoe@gmail.com:

  • Email domain matching identifies Google as the only matching provider
  • With instant redirect enabled, user is immediately sent to Google authentication
  • Without instant redirect, user sees a list with Google as the only option (extra click)

Best practices

  • Enable for providers with predictable, non-overlapping email domains
  • Test thoroughly to ensure only one provider matches before enabling
  • Combine with email domain discovery for best results

Step 5: Configure fallback provider (optional)

A fallback provider is displayed when intelligent discovery doesn't match any configured rules. This serves both security and user experience purposes.

  1. From the Edit provider page, scroll to Other options.
  2. Select the Fallback provider check box.
  3. Save your changes.

Why use a fallback provider

Security: Prevents username and domain enumeration attacks. By always displaying a provider (instead of showing "no match found"), attackers cannot determine which email domains or usernames are valid in your system. Both valid and invalid identifiers receive the same response.

User experience: Ensures users always have an authentication path. Users whose identifiers don't match discovery rules aren't blocked by an error—they can still attempt authentication with the fallback provider.

Important

Only one fallback provider can be configured per workspace. Choose the fallback provider based on your security and UX needs:

  • Local authentication - For internal workspaces where unmatched users should authenticate locally
  • Primary enterprise provider (like Azure AD) - For enterprise workspaces where most users should fall back to your main identity system
  • Social provider - For customer-facing applications as a catch-all option

How it works

  • User enters an identifier
  • Intelligent discovery checks configured email domains and user records
  • If no match is found and a fallback provider is configured:
    • The fallback provider is displayed
    • User can authenticate with the fallback
  • If no match is found and NO fallback provider is configured:
    • All enabled providers are shown
    • User must manually select

Best practices

  • Configure exactly one fallback provider - Required for optimal security and UX
  • Choose strategically - Pick a provider that makes sense for unmatched users in your use case
  • Test with multiple scenarios - Test with recognized domains, unrecognized domains, and edge cases
  • Document your choice - Communicate to users what the fallback represents

Step 6: Review your configuration

Verify that your Intelligent Discovery setup is complete and functioning correctly.

  1. Go to Authentication > Providers.
  2. Click the Discovery tab.
  3. Review the configured providers and verify:
    • Authentication Provider column shows all your providers
    • Email Domains column shows your configured domains
    • Enabled toggle is ON for providers you want to use
    • Visible by Default column shows correct visibility settings

The provider table should display:

  • Providers with configured email domains
  • Status toggles for enabled/disabled
  • Visual indicators for special settings (instant redirect, fallback provider, visible by default)

Testing your configuration

Test your Intelligent Discovery setup with different user identifiers to ensure correct routing:

Test email domain matching

  1. Enter an identifier with a configured domain (e.g., user@gmail.com)
  2. Verify the correct provider is presented or instant redirect occurs
  3. Complete authentication to confirm the provider is working

Test user lookup

If you enabled user record lookup:

  1. Enter identifiers from your user directory
  2. Verify they route to the correct provider
  3. Test with identifiers not in any configured domain

Test fallback

  1. Enter an identifier that doesn't match any configured domains
  2. Verify a fallback provider is presented (if configured)
  3. Confirm users can still authenticate with the fallback

Test with different scenarios

  • Try identifiers from different organizations
  • Try identifiers from different domains
  • Try identifiers with unusual formats
  • Test on different devices or networks if applicable

Troubleshooting

Discovery not working - users see all providers regardless of identifier

Possible causes:

  • Intelligent Discovery not enabled
  • Email domains not configured correctly
  • User Record Lookup not enabled when needed

Solution:

  1. Verify Intelligent Discovery is selected in the Discovery tab
  2. Check that email domains are correctly entered for providers
  3. Enable User Record Lookup if using directory-based matching
  4. Confirm all providers show Enabled toggle as ON

Instant redirect not working - users see provider list instead of redirecting

Possible causes:

  • Instant redirect not enabled for the provider
  • Multiple providers match the user identifier
  • Duplicate domain configurations

Solution:

  1. Verify Instant Redirect is checked for the provider
  2. Test with an identifier that should match only one provider
  3. If multiple providers have the same domain, remove duplicate domain configurations
  4. Check logs to see which providers are matching

Users stuck when no matching provider found

Possible causes:

  • No fallback provider configured
  • Fallback provider is disabled

Solution:

  1. Configure a fallback provider as described in Step 5
  2. Ensure the fallback provider is marked as Active

Next steps

See also