Single Sign-On (SSO)
Single Sign-On (SSO) allows enterprise users to authenticate using their organization’s identity provider, providing centralized authentication and access control.Overview
SSO enables users to sign in to Odin AI using their organization’s existing identity provider, eliminating the need for separate credentials.Odin AI’s support team handles SSO configuration and testing. You only need to configure your identity provider and provide the necessary details (metadata URL, domain, and provider) to support@getodin.ai.
Supported SSO Providers
Odin AI supports SSO with:- Okta - Enterprise identity management
- Azure AD - Microsoft Azure Active Directory
- Custom SSO - SAML 2.0 compatible identity providers
Benefits
- Centralized Authentication - One login for all enterprise applications
- Enhanced Security - Organization-controlled access
- User Management - Centralized user provisioning and deprovisioning
- Compliance - Meets enterprise security requirements
- User Experience - Seamless authentication experience
Okta SSO Configuration
Prerequisites
- Okta administrator access
- Your Odin AI instance URL
Step 1: Okta Application Setup
-
Log in to Okta Admin Console
- Visit your Okta admin console
- Navigate to Applications > Applications
-
Create New Application
- Click Create App Integration
- Select SAML 2.0 as the sign-in method
- Click Next
-
Configure General Settings
- App name: Enter a name (e.g., “Odin AI”)
- App logo: Upload Odin AI logo (optional)
- Click Next
-
Configure SAML Settings
- Single sign-on URL:
https://your-odin-domain.com/user/okta/sso/saml/acs/admin - Audience URI (SP Entity ID):
https://your-odin-domain.com - Name ID format:
EmailAddress - Application username:
Email - Update application username on:
Create and update
- Single sign-on URL:
-
Attribute Statements (Optional)
- Add attribute mappings as needed:
email→user.emailfirstName→user.firstNamelastName→user.lastName
- Add attribute mappings as needed:
-
Group Attribute Statements (Optional)
- Configure group mappings if needed
-
Feedback (Optional)
- Select feedback options
- Click Finish
Step 2: Get Okta Configuration
-
View SAML Setup Instructions
- In your Okta application, go to Sign On tab
- Click View SAML 2.0 Setup Instructions
-
Copy Metadata URL
- Note the Identity Provider metadata URL
- Format:
https://your-okta-domain.okta.com/app/your-app-id/sso/saml/metadata
-
Alternative: Download Metadata
- Download the SAML metadata XML file
- Save it for configuration
Step 3: Submit Configuration to Odin AI
Odin AI’s support team will configure and test your SSO setup. Please provide the following information:-
Send Configuration Details
- Email support@getodin.ai with the following information:
- Provider: Okta
- Enterprise ID: Your organization’s domain (e.g.,
company.com) - Metadata URL: The Okta metadata URL from Step 2
- SSO Sign-In Only (Optional): Specify if you want to require SSO for all users with this domain
- Email support@getodin.ai with the following information:
-
Odin AI Configuration
- Odin AI’s support team will configure SSO on your instance
- They will test the SSO connection
- You will be notified once configuration is complete
-
Testing
- Odin AI’s team will test the SSO connection
- You may be asked to verify the connection works
- Once confirmed, SSO will be enabled for your organization
Troubleshooting Okta SSO
Issue: Redirect loop or authentication failure Solutions:- Verify the Single sign-on URL matches exactly
- Check that the Audience URI is correct
- Ensure Name ID format is set to EmailAddress
- Verify metadata URL is accessible
- Check Okta application is active
- Verify email attribute mapping in Okta
- Check user exists in Odin AI
- Ensure user provisioning is configured
- Verify enterprise ID matches email domain
Azure AD SSO Configuration
Prerequisites
- Azure Portal administrator access
- Microsoft 365 account with admin access
- Your Odin AI instance URL
Step 1: Azure Portal Setup
-
Go to Azure Portal
- Visit portal.azure.com
- Sign in with your administrator account
-
Navigate to Azure Active Directory
- Go to Azure Active Directory > Enterprise applications
- Click New application
-
Create Enterprise Application
- Click Create your own application
- Enter application name (e.g., “Odin AI”)
- Select Integrate any other application you don’t find in the gallery
- Click Create
Step 2: Configure SAML SSO
-
Set Up Single Sign-On
- In your application, go to Single sign-on
- Select SAML as the method
-
Basic SAML Configuration
- Identifier (Entity ID):
https://your-odin-domain.com - Reply URL (Assertion Consumer Service URL):
https://your-odin-domain.com/user/azure/sso/saml/acs/admin - Sign-on URL:
https://your-odin-domain.com - Relay State (Optional): Leave blank or configure as needed
- Identifier (Entity ID):
-
User Attributes & Claims
- Unique User Identifier:
user.mailoruser.userprincipalname - Email:
user.mail - First Name:
user.givenname - Last Name:
user.surname - Display Name:
user.displayname
- Unique User Identifier:
-
SAML Signing Certificate
- Note the certificate details
- Download the certificate if needed (Base64 format)
Step 3: Get Azure Configuration
-
Download Federation Metadata
- In the SAML configuration, find SAML Signing Certificate
- Click Download for Federation Metadata XML
- Save the metadata file
-
Alternative: Copy Metadata URL
- Note the App Federation Metadata Url
- Format:
https://login.microsoftonline.com/{tenant-id}/federationmetadata/2007-06/federationmetadata.xml
Step 4: Assign Users
-
In Azure Portal
- Go to your Enterprise Application
- Navigate to Users and groups
- Click Add user/group
- Select users or groups to assign
- Click Assign
-
User Access
- Assigned users can sign in via SSO once configuration is complete
- Users will be redirected to Azure AD for authentication
Step 5: Submit Configuration to Odin AI
Odin AI’s support team will configure and test your SSO setup. Please provide the following information:-
Send Configuration Details
- Email support@getodin.ai with the following information:
- Provider: Azure AD (or Azure)
- Enterprise ID: Your organization’s domain (e.g.,
company.com) - Metadata URL: The Azure metadata URL from Step 3
- Alternative: Attach the Federation Metadata XML file if you downloaded it
- SSO Sign-In Only (Optional): Specify if you want to require SSO for all users with this domain
- Email support@getodin.ai with the following information:
-
Odin AI Configuration
- Odin AI’s support team will configure SSO on your instance
- They will test the SSO connection
- You will be notified once configuration is complete
-
Testing
- Odin AI’s team will test the SSO connection
- You may be asked to verify the connection works
- Once confirmed, SSO will be enabled for your organization
Troubleshooting Azure AD SSO
Issue: SAML assertion errors Solutions:- Verify Reply URL matches exactly
- Check Identifier (Entity ID) is correct
- Ensure user attributes are mapped correctly
- Verify certificate is valid and not expired
- Verify user is assigned to the application in Azure AD
- Check email attribute mapping
- Ensure user exists in Odin AI
- Verify enterprise ID matches email domain
Custom SSO Configuration
Overview
Odin AI supports custom SSO providers that are SAML 2.0 compatible, allowing integration with any identity provider that supports SAML.Prerequisites
- SAML 2.0 compatible identity provider
- Identity provider administrator access
- SAML metadata URL or XML file
Step 1: Identity Provider Setup
-
Configure SAML Application
- In your identity provider, create a new SAML application
- Configure the following settings:
- Assertion Consumer Service (ACS) URL:
https://your-odin-domain.com/user/sso/saml/acs/admin - Entity ID / Audience:
https://your-odin-domain.com - Name ID Format:
EmailAddressorUnspecified - Attribute Mappings: Map email, name, and other attributes
- Assertion Consumer Service (ACS) URL:
-
Get SAML Metadata
- Obtain the SAML metadata URL or XML file
- This contains all necessary configuration information
Step 2: Submit Configuration to Odin AI
Odin AI’s support team will configure and test your SSO setup. Please provide the following information:-
Send Configuration Details
- Email support@getodin.ai with the following information:
- Provider: Your identity provider name (e.g., “PingIdentity”, “OneLogin”, “Auth0”)
- Enterprise ID: Your organization’s domain (e.g.,
company.com) - Metadata URL: The SAML metadata URL from Step 1
- Alternative: Attach the SAML metadata XML file if you have it
- SSO Sign-In Only (Optional): Specify if you want to require SSO for all users with this domain
- Email support@getodin.ai with the following information:
-
Odin AI Configuration
- Odin AI’s support team will configure SSO on your instance
- They will test the SSO connection
- You will be notified once configuration is complete
-
Testing
- Odin AI’s team will test the SSO connection
- You may be asked to verify the connection works
- Once confirmed, SSO will be enabled for your organization
SSO Sign-In Only Mode
Overview
SSO Sign-In Only mode requires all users with a specific email domain to use SSO authentication, disabling email/password authentication for that domain.Configuration
-
Enable SSO Sign-In Only
- In SSO configuration, enable SSO Sign-In Only
- This applies to all users with the configured enterprise domain
-
User Experience
- Users with the domain cannot use email/password
- They must use SSO to sign in
- Email/password reset is disabled for these users
Benefits
- Enhanced Security - Forces use of organization-controlled authentication
- Centralized Access - All access goes through identity provider
- Compliance - Meets enterprise security policies
SSO Best Practices
Configuration
- Test Thoroughly - Test SSO configuration before enabling for all users
- Document Configuration - Keep records of SSO configuration details
- Monitor Logs - Regularly review SSO authentication logs
- User Provisioning - Set up automated user provisioning if possible
- Backup Authentication - Consider keeping email/password as backup
Security
- Regular Audits - Review SSO access regularly
- User Management - Ensure proper user provisioning and deprovisioning
- Access Control - Configure appropriate access controls
- Monitoring - Monitor for suspicious authentication attempts
- Certificate Management - Keep SAML certificates up to date
Troubleshooting
General SSO Issues
Problem: SSO redirect not working Solutions:- Verify SSO configuration is correct
- Check metadata URL is accessible
- Verify ACS URL matches exactly
- Check identity provider logs
- Verify user is assigned to application
- Verify email attribute mapping
- Check user exists in Odin AI
- Ensure enterprise ID matches email domain
- Verify user provisioning is configured
- Verify SAML configuration matches exactly
- Check certificate validity
- Ensure attribute mappings are correct
- Verify time synchronization between systems
Related Documentation
- Email/Password & Google Sign-In - Learn about basic authentication
- My Account Settings - Manage your account settings
- Security & Data Practices - Learn about security measures
Email/Password & Google Sign-In
Learn about email/password and Google Sign-In authentication
My Account Settings
Manage your account settings and preferences

