Hi all — looking for guidance and confirmation on a BC/DR pattern for Box SSO.
Current state (redacted):
-
Box Enterprise with SAML SSO enabled. Primary IdP = a third-party SAML provider (not Okta).
-
“SSO Required” is OFF so password logins remain possible.
-
Two Box admin accounts have SSO bypass enabled and strong passwords (tested at
https://account.box.com/login
). -
A standby Okta SAML configuration is pre-staged in Enterprise Settings → Authentication (uploaded Okta IdP metadata & SHA-256 signing cert).
-
Okta app uses NameID = EmailAddress; app username = email; standard
givenName
/sn
claims. -
No change to the production IdP yet—we only want an emergency fallback.
-
SCIM provisioning from Okta is not enabled (SSO only).
What we want to do during an IdP outage:
-
Admins enter via password (SSO bypass).
-
Optionally flip SSO Provider in Box from the primary IdP → Okta to keep SSO for users.
-
Keep SSO Required = OFF during the flip; validate with pilots; later flip back to the primary IdP.
Questions for the community:
-
Is this pattern (two SSO-bypass admins + pre-staged alternate SAML provider kept on file but not enforced) a supported/best-practice approach for Box?
-
When switching SSO Provider (Primary ↔ Okta), is the change immediate? What happens to active sessions—are users forced to re-authenticate?
-
Any metadata caching/TTL or propagation delay that could affect a quick flip?
-
Any limits or caveats to keeping multiple SSO certs/configs stored (primary + standby) while only one provider is active?
-
For validation: recommendations on SSO Test Mode vs simply leaving SSO Required = OFF?
-
Security/audit: best way to monitor password logins (SSO bypass) during incidents; which events should we watch in Box logs? Any way to limit password logins to specific admins/IPs beyond per-user bypass?
-
Role requirements: which admin roles/permissions are needed to (a) enable SSO bypass for a user and (b) change the SSO Provider setting?
-
Confirm that SCIM/API provisioning can be enabled later independently of SSO and does not alter the active IdP.
Appreciate any tips, gotchas, or a short runbook others have used for this scenario!