Skip to main content

SSO Configuration

Configure Single Sign-On for your organization using SAML 2.0 or OIDC. Once enabled, members authenticate through your identity provider (Okta, Azure AD, Google Workspace, etc.) instead of email/password.

Requirements

RequirementValue
PlanEnterprise
RoleOwner
AuthJWT

Endpoints

MethodPathDescription
GET/v1/sso/configGet current SSO configuration
POST/v1/sso/configCreate or update SSO configuration
DELETE/v1/sso/configRemove SSO configuration
POST/v1/sso/config/testTest SSO configuration before enforcing

Get SSO Config

GET /v1/sso/config

Response 200 OK

{
"provider": "saml",
"issuer": "https://idp.example.com",
"sso_url": "https://idp.example.com/sso/saml",
"certificate": "MIIC...",
"enforced": true,
"created_at": "2026-04-01T00:00:00Z"
}

Returns 404 if no SSO configuration exists.


Create/Update SSO Config

POST /v1/sso/config

Request

{
"provider": "saml",
"issuer": "https://idp.example.com",
"sso_url": "https://idp.example.com/sso/saml",
"certificate": "MIIC...",
"enforced": false
}
FieldTypeRequiredDescription
providerstringYessaml or oidc
issuerstringYesIdentity provider issuer URL
sso_urlstringYesSSO login endpoint
certificatestringYesIdP signing certificate (PEM, base64)
enforcedbooleanNoIf true, all members must use SSO

Response 200 OK

{
"message": "SSO configuration saved"
}

Delete SSO Config

DELETE /v1/sso/config

Response 204 No Content


Test SSO Config

Validates the configuration against the IdP without enforcing it.

POST /v1/sso/config/test

Response 200 OK

{
"success": true,
"provider": "saml",
"issuer": "https://idp.example.com"
}

Returns 422 with a descriptive error if the configuration is invalid or the IdP is unreachable.