Skip to main content

What's New in Certara Admin?

April 2026 Release

Updated over a week ago

The following information describes new features, updates or changes to Certara Admin. For a complete list of all changes, including bug fixes, please see the Release Notes.

Users

Sign in page

We've enhanced the sign in page. Depending on your organization's configuration, you may now see the following:

Instance type

A message now indicates if you are signing into a non-production instance (e.g. sandbox, staging, or other).

New users must sign in using SSO

  • If configured by your organization, a message will inform new users that they must sign in using Single Sign-On (SSO).

All users must sign in using SSO

  • If required by your organization, the page will state that all users must sign in with SSO.

Multiple SSO options

If your organization has multiple SSO providers, you will now see a separate sign in button for each. Administrators can set display names for each SSO option, for example, "Single sign-on (SSO) for internal workforce".

Sign in to Phoenix Hosted with your Certara ID.

You can now use your Certara ID to sign in to applications like Phoenix Hosted, thanks to new Single Sign-On (SSO) support. This simplifies access by letting you use a single set of credentials for the hosted virtual desktop and all supported Certara products.

Administrators

Single Sign-On

General SSO Settings

To better support multiple SSO identity providers (IdPs), the following global settings have been grouped together on the SSO Settings page:

  • Require user creation through SSO

  • Require user sign-in through SSO

  • Log users out from IdP when logging out of Certara

These settings may impact the login pages shown above.

Note: To change the SSO configuration name, SSO button label or to activate multiple SSO configurations, contact Certara (your Customer Success Manager, open CASD ticket, or email [email protected].)

SAML User-creation and Deactivation

Certara users can now be created or deactivated by your IdP using the SCIM protocol and an authentication token. For IdPs configured with the SCIM token, users are created or deactivated in your organization based on the rules you set in your IdP.

Important Notes:

  • If the user already has a password-based account within the organization, their account is converted to an SSO-managed account.

  • A user’s email address must be unique within an organization.

  • If multiple IdPs are configured:

    • When you create a user with SCIM, they are automatically associated with the Identity Provider (IdP) linked to that SCIM token.

    • You cannot use SCIM to manage a user who is already associated with a different IdP.

  • Audit logs show created or deactivated users being modified by SYSTEM.

Notifications

Improved user-blocked notifications

The email notification sent to administrators when a user is blocked now includes more detailed information to help you troubleshoot faster.

The "User is Blocked" email notification now includes:

The reason the user was blocked, such as:

  • Multiple failed login attempts

  • Attempted login from a blocked IP address.

The product or service that the user was attempting to access:

  • The product the user was trying to log into

  • The Product Environment URL.

The specific Organization Name or instance.

The user-blocked email also now includes a link to a help article with instructions on how to unblock users.

Change of email address notification

When a user's email address is changed, an email notification is now sent to all Global Admins and any Product Admins for products assigned to that user. Previously, only the impacted user was notified.

Did this answer your question?