Why Sage X3 Needs Modern SSO
Sage X3 (formerly Sage ERP X3 / Adonix X3) is an enterprise resource planning system used by mid-market and large enterprises in manufacturing, distribution, chemicals, food and beverage, and services industries worldwide. Built on a proprietary 4GL runtime (Sage's own SAFE X3 engine) with a web-based Syracuse interface, Sage X3 manages financials, purchasing, sales, inventory, manufacturing, and CRM. Despite its modern web UI, Sage X3's authentication model remains isolated from corporate identity infrastructure. Users authenticate with Sage X3-specific credentials stored in the application's own user management system. The Syracuse web server (Node.js-based) does not support SAML SP or OIDC relying-party flows natively. Organizations must either accept the credential silo or invest in custom development to bridge Sage X3 with their IdP. OnePAM solves this by operating as an identity-aware reverse proxy in front of the Sage X3 Syracuse web server. Users authenticate through your corporate IdP, and OnePAM injects the authenticated identity into the Syracuse session via HTTP header propagation or session cookie injection. All Sage X3 web functions — financials, inventory, manufacturing, CRM — gain SSO without application server modifications or custom 4GL development.
Authentication Challenges with Sage X3
These are the security and operational challenges organizations face when Sage X3 relies on its native authentication model.
Isolated User Management
Sage X3 maintains its own user database with credentials separate from your corporate directory and IdP, creating yet another credential silo.
No Native Federation
The Syracuse web server (Node.js-based) does not support SAML or OIDC natively. There is no built-in mechanism to delegate authentication to an external IdP.
Proprietary 4GL Runtime
Sage X3's SAFE X3 engine uses a proprietary 4GL language. Customizing authentication requires specialized Sage development expertise.
Syracuse Architecture
Syracuse is a multi-tier Node.js application with its own session management. Integrating external authentication requires deep knowledge of the Syracuse architecture.
Limited Sage Partner Options
Few Sage partners offer SSO solutions, and those available often require invasive changes to the Syracuse server or custom connector development.
Compliance Requirements
Manufacturing and distribution industries face increasing audit requirements (SOX, FDA 21 CFR Part 11) that demand centralized access control and audit trails.
How OnePAM Adds SSO to Sage X3
A step-by-step guide to deploying modern SSO for Sage X3 using OnePAM's identity-aware reverse proxy.
Deploy OnePAM Gateway
Install OnePAM as a reverse proxy in front of the Sage X3 Syracuse web server.
Connect Your Identity Provider
Configure your corporate IdP (Okta, Azure AD, Google Workspace, or any SAML 2.0 / OIDC provider) as the authentication source.
Map IdP Users to Sage X3 Users
Define how IdP user attributes (email, employee ID, UPN) map to Sage X3 user codes and folders.
Enable Session Injection
OnePAM injects the authenticated identity into Sage X3 via HTTP header propagation or Syracuse session cookie injection.
Enforce Policies & Audit
Apply access policies per Sage X3 folder and function group, enforce MFA, enable session recording, and generate compliance reports.
Benefits of SSO for Sage X3
Measurable business outcomes from deploying OnePAM SSO in front of Sage X3.
Eliminate X3 Passwords
Users access Sage X3 with their corporate IdP credentials — no separate X3 password to maintain, expire, or reset.
85% fewer X3 password ticketsEnforce MFA for Sage X3
Apply your IdP's MFA policies to all Sage X3 access — push notifications, FIDO2 keys, or biometrics — without Syracuse modifications.
100% MFA-protected X3 accessInstant Deprovisioning
Disable a user in your IdP and their Sage X3 access stops immediately. No orphan X3 user accounts, no lingering sessions.
Real-time access revocationNo Custom Development
OnePAM provides SSO for Sage X3 without requiring custom 4GL development, Syracuse server modifications, or Sage partner engagement.
Zero development costUnified Compliance
Sage X3 access events appear alongside all other enterprise applications in a single audit trail with full IdP context and device information.
Audit-ready in minutesNo Syracuse Changes
No Node.js code modifications, no Syracuse configuration changes, no Sage X3 4GL patches. OnePAM works entirely at the HTTP layer.
Zero server changesSage X3 SSO Capabilities
Every feature needed to provide enterprise-grade SSO for Sage X3.
Security Features
Enterprise-grade security controls protecting the SSO integration layer.
Sage X3 SSO Use Cases
Common scenarios where organizations deploy OnePAM SSO for Sage X3.
Sage X3 SSO FAQ
Common questions about deploying OnePAM SSO for Sage X3.
Does OnePAM require changes to the Sage X3 Syracuse server or 4GL code?
Which Sage X3 versions are supported?
Does OnePAM work with Sage X3 multi-folder (multi-company) setups?
How does OnePAM handle the Sage X3 Syracuse session lifecycle?
Can we use OnePAM alongside Sage X3's built-in LDAP integration?
Does OnePAM support Sage X3 REST web services?
Ready to Add SSO to Sage X3?
Deploy OnePAM in hours — not months. No Sage X3 code changes required. Start your free 14-day trial today.