Parallels Desktop Enterprise Edition Administrator's Guide
ProductsSupportDocumentation
  • Introduction
  • Upgrading from Business Edition
    • How to Trial Enterprise Edition with Existing Business Edition Per-user License
    • What Happens after a Trial Ends
    • Migrating from Business Edition to Enterprise Edition
    • Migrating from per-device to per-user licensing
  • Getting Started
    • Creating a Business Account and Registering Your License
    • Dividing Users into Groups with Sublicenses
    • Configuring Golden Images and Policies in the Management Portal
    • Installing and Activating Parallels Desktop
  • Configuring the Single Sign-On (SSO) integration with Parallels My Account
    • Prerequisites
    • Starting the Integration Process in Parallels My Account
      • Configuring SSO Integration with Azure/Entra ID
      • Configuring SSO Integration with Okta
      • Configuring SSO Integration with Ping Identity
      • Configuring SSO Integration with JumpCloud
      • Configuring SSO Integration with Google Workspace
    • [OPTIONAL] How to Divide Users into Groups and Assign Them Sublicenses
    • Troubleshooting the SSO Activation
  • Creating and Uploading Virtual Machine Images
  • Mass Deployment of Parallels Desktop and Virtual Machines
    • Deploying via an Invitation Email
    • Mass Deployment Using Mac Management Tools
      • [RECOMMENDED] Deploying Parallels Desktop via MDM App Catalogs Using Configuration Profiles
        • Creating and Editing a Configuration Profile in iMazing
        • Deploying Parallels Desktop via MDM App Catalog (as seen in Jamf Pro)
      • [ALTERNATIVE] Mass Deployment via Deployment Package
        • Prerequisites
        • Supported Mac Management Tools
        • Preparing the Autodeploy Package
          • Downloading the Autodeploy Package
          • Specifying a License Key
          • [OPTIONAL] Adding the Parallels Desktop Installation Image
          • [OPTIONAL] Adding a Virtual Machine
            • Installing Parallels Tools
            • Preparing Windows for Mass Deployment
            • Common Configuration Options
          • Adding Windows Application Stubs
          • Configuring Deployment Options
          • Single Application Mode
          • [MANDATORY] Creating a Flat Package
          • Testing the Autodeploy Package
        • Deploying the Package to Macs
          • Example: Jamf Pro
            • Automating Parallels Desktop Initial Setup with a Configuration Profile
          • Using a Script to Change VM Options
    • Enrolling Virtual Machines in Azure Active Directory
  • Parallels Management Portal
    • Golden Images
    • Policies
    • User Groups
    • Virtual Machines
    • Providing Feedback
  • Parallels Desktop for Mac Enterprise Edition Features
    • [DEPRECATED] Using Configuration Profiles
      • Creating a Configuration Profile
      • Applying a Configuration Profile to a License Key
      • Provisioning a Corporate VM Image
        • Creating a Configuration Profile
        • Installing a VM Image on a Mac
      • Enabling Major Version Upgrades
        • Creating a Configuration Profile
    • Participating in the Customer Experience Program
    • Locking a Virtual Machine on Suspend
    • Activating Using a Corporate Account
    • Restricting a Virtual Machine Configuration with a Custom Password
    • Restricting User Actions in Parallels Desktop
    • Setting an Asset Tag in the Virtual Machine BIOS
    • Using Custom Graphics and Links in the Control Center
    • Hiding Developer Tools in the Parallels Desktop GUI
    • Encrypting a Virtual Machine
    • Single Application Mode
    • Setting an Expiration Date on a Virtual Machine
    • Enforcing USB Device Policies
    • Resetting the Guest OS Password
    • Setting Up a Local Update Server
      • Setting Up a Local Web Server
      • Creating the Parallels Update XML File
      • Configuring Individual Macs
    • Configuring Parallels Desktop Update Branch
    • Customizing the Support Center Option
Powered by GitBook

Other Resources

  • Community Forum
  • Knowledge Base
  • Request Support

Social Media

  • Facebook
  • Twitter/X
  • YouTube
  • LinkedIn

© 2025 Parallels International GmbH. All rights reserved.

On this page
Export as PDF

Configuring the Single Sign-On (SSO) integration with Parallels My Account

PreviousInstalling and Activating Parallels DesktopNextPrerequisites

Last updated 3 months ago

Integration between Parallels My Account and corporate Identity Providers (IdP) like Microsoft Entra ID, Okta, or Ping Identity enables Single Sign-On (SSO) login to Parallels My Account and automatic provisioning and revocation of Parallels product licenses to end users in your organization. The organization’s business account admins can log into using their company's standard authentication procedure, while the end-users can activate Parallels products on their devices via Single Sign-On.

Note: In the case of Parallels Desktop for Mac Enterprise Edition, a mixed licensing policy enables administrators to combine fixed per-device license seats and SSO per-user license seats as they see fit.

Even if your organization does not use Parallels Desktop for Mac Enterprise Edition, you may benefit from the SSO integration with My Account. Such integration provides more control over the users with administrative access to the Parallels product licenses stored in the organization’s business account registered with Parallels.

Warning: Once you have completed the integration process and activated the SSO functionality, only users from the Administrators group in your IdP signing in via SSO will retain access to managing the Parallels business account. All previous administrative privileges based on logins and passwords will become inactive.

Your designated backup login will continue to work.

Once the integration is configured, you can grant access to the organization’s business account to administrators by adding them to the Parallels Business Account Admins group in your Identity Provider’s directory. At the same time, deleting or blocking an administrator account in your Identity Provider automatically deprives them of access to Parallels My Account.

Note: The integration between Parallels My Account and IdPs relies on SAML 2.0 for SSO and SCIM 2.0 for user identity information synchronization.

In this section, we provide detailed instructions on how to set up the SSO integration with Microsoft Azure/Entra ID, Okta, and Ping Identity. Even if your corporate identity provider is not on the list, you can still try setting up the integration, provided your service of choice supports SAML 2.0 and SCIM 2.0 protocols.

Once the integration is completed, the administrators will be able to sign into the company's My Account page using the Continue with SSO button at , while the Parallels Desktop for Mac users will be able to activate their local copies of the app using the SSO option.

Note: If members of the Admin group need to also be able to use Parallels Desktop for Mac, they should be explicitly added to the Parallels Desktop users group.

My Account
https://my.parallels.com/login