Prerequisites
You need:- Growth plan subscription
- Admin access to your identity provider (Okta or Microsoft Entra)
- Identity provider that supports OpenID Connect Discovery
Contact your Oso Cloud team before starting. Some configuration steps require team member assistance.
Configure SSO with Okta
Create OIDC Application
- Log into Okta Admin Console
- Navigate to Applications → Create App Integration
-
Select integration settings:
- Sign-on method: OIDC - OpenID Connect
- Application type: Web Application
-
Configure application settings:
- Check Authorization Code in Core grants (no other grants needed)
- Sign-in redirect URI:
https://ui.osohq.com/web/oauth/oidc/callback
- Logout redirect URI:
https://ui.osohq.com/web/logout
- Set user assignments: Choose which users can access Oso Cloud through this application. Users still need manual invites to your Oso Cloud organization.
- Click Save
Optional: Configure Identity Provider (IdP) Initiated Login
Enable users to launch Oso Cloud directly from Okta:- Navigate to General tab of your created application
- Configure login settings:
- Login initiated by: Either Okta or app
- Initiate login URI:
https://ui.osohq.com/web/oauth/oidc/CUSTOMER_ID/login/
CUSTOMER_ID
with your 3-5 character identifier.
Gather Required Information
Copy these values from your Okta application’s General tab:- Client ID
- Client Secret
- OIDC Discovery URL (example:
https://trial-8895628.okta.com/.well-known/openid-configuration
)
acme
).
Send these to your Oso Cloud contact for final setup.
Configure SSO with Microsoft Entra
Create Application Registration
- Log into Azure portal
- Navigate to Microsoft Entra ID → Manage → App Registrations
- Click New registration
-
Configure registration:
- Provide application name
- Select supported account types (single or multi-tenant)
- Redirect URI platform: Web
- Callback URL:
https://ui.osohq.com/web/oauth/oidc/callback
- Click Register
Configure Application
-
Generate client secret:
- Navigate to Certificates & Secrets
- Create new client secret
-
Copy required values:
- Client ID (from Overview tab)
- Client Secret (from step 1)
- OpenID Connect metadata URL (from Endpoints)
acme
).
Send these to your Oso Cloud contact for final setup.
Sign In with SSO
- Navigate to https://ui.osohq.com/
- Select “Log in with SSO”
- Enter your Customer ID (provided by your team or chosen during setup)
- Click Continue
Important Limitations
- Manual user invites required. SSO does not auto add users.
- No SCIM/JIT provisioning.
- Org migrations. Re-invite all users with corporate emails; SSO and non-SSO logins are separate accounts.
- Non-SSO access remains. Remove users manually if enforcing SSO-only.