Prerequisites
You need:
- Growth plan subscription
- Admin access to your identity provider (Okta or Microsoft Entra)
- Identity provider that supports OpenID Connect Discovery
Contact your Oso Cloud team before starting. Some configuration steps require team member assistance.
Create OIDC Application
-
Log into Okta Admin Console
-
Navigate to Applications → Create App Integration
-
Select integration settings:
- Sign-on method: OIDC - OpenID Connect
- Application type: Web Application
-
Configure application settings:
- Check Authorization Code in Core grants (no other grants needed)
- Sign-in redirect URI:
https://ui.osohq.com/web/oauth/oidc/callback
- Logout redirect URI:
https://ui.osohq.com/web/logout
-
Set user assignments:
Choose which users can access Oso Cloud through this application. Users still need manual invites to your Oso Cloud organization.
-
Click Save
Enable users to launch Oso Cloud directly from Okta:
- Navigate to General tab of your created application
- Configure login settings:
- Login initiated by: Either Okta or app
- Initiate login URI:
https://ui.osohq.com/web/oauth/oidc/CUSTOMER_ID/login/
Replace CUSTOMER_ID with your 3-5 character identifier.
Copy these values from your Okta application’s General tab:
- Client ID
- Client Secret
- OIDC Discovery URL (example:
https://trial-8895628.okta.com/.well-known/openid-configuration)
Choose a Customer ID: Create a short 3-5 character identifier (example: acme).
Send these to your Oso Cloud contact for final setup.
Create Application Registration
-
Log into Azure portal
-
Navigate to Microsoft Entra ID → Manage → App Registrations
-
Click New registration
-
Configure registration:
- Provide application name
- Select supported account types (single or multi-tenant)
- Redirect URI platform: Web
- Callback URL:
https://ui.osohq.com/web/oauth/oidc/callback
-
Click Register
-
Generate client secret:
- Navigate to Certificates & Secrets
- Create new client secret
-
Copy required values:
- Client ID (from Overview tab)
- Client Secret (from step 1)
- OpenID Connect metadata URL (from Endpoints)
Choose a Customer ID: Create a short 3-5 character identifier (example: acme).
Send these to your Oso Cloud contact for final setup.
Sign In with SSO
- Navigate to https://ui.osohq.com/
- Select “Log in with SSO”
- Enter your Customer ID (provided by your team or chosen during setup)
- Click Continue
Oso Cloud redirects you to your identity provider for authentication, then returns you to complete the sign-in process.
Important Limitations
- Manual user invites required. SSO does not auto add users.
- No SCIM/JIT provisioning.
- Org migrations. Re-invite all users with corporate emails; SSO and non-SSO logins are separate accounts.
- Non-SSO access remains. Remove users manually if enforcing SSO-only.