When a user who already has a local account (with username/password) signs in via SAML SSO for the first time, ChangeBreeze automatically converts their account to a SAML-only account.
What happens during conversion
- User initiates SAML login - The user clicks "Sign in with SAML SSO" and authenticates with their Identity Provider (e.g., Azure AD, Okta)
- Email matching - ChangeBreeze matches the email address from the SAML assertion to the existing local account
- Password disabled - The user's local password is automatically disabled
- Account becomes SAML-only - From this point forward, the user can only authenticate via their organisation's Identity Provider
Why we do this
- Security - Prevents users from bypassing SSO policies by using local passwords
- Consistency - Ensures all authentication goes through the organisation's IdP where MFA and conditional access policies are enforced
- Compliance - Supports organisations that require centralised authentication management
What SAML users cannot do
Once converted to a SAML account, users:
- ❌ Cannot reset their password via the "Forgot Password" link
- ❌ Cannot change their password in account settings
- ❌ Cannot sign in with email/password
Converting back to a local account
If a user needs to be converted back to a local account (e.g., leaving the organisation but retaining access), an administrator must:
- Delete the user account from ChangeBreeze
- Re-create the user as a local user with a new password
- The user will receive a temporary password and be prompted to change it on first login
Note: There is no direct "convert to local" function. This is intentional to prevent accidental security policy bypasses.