Prerequisites
You need:- Growth plan subscription
 - Admin access to your identity provider (Okta or Microsoft Entra)
 - Identity provider that supports OpenID Connect Discovery
 
Contact your Oso Cloud team before starting. Some configuration steps require team member assistance.
Configure SSO with Okta
Create OIDC Application
- Log into Okta Admin Console
 - Navigate to Applications → Create App Integration
 - 
Select integration settings:
- Sign-on method: OIDC - OpenID Connect
 - Application type: Web Application
 
 - 
Configure application settings:
- Check Authorization Code in Core grants (no other grants needed)
 - Sign-in redirect URI: 
https://ui.osohq.com/web/oauth/oidc/callback - Logout redirect URI: 
https://ui.osohq.com/web/logout 
 - Set user assignments: Choose which users can access Oso Cloud through this application. Users still need manual invites to your Oso Cloud organization.
 - Click Save
 
Optional: Configure Identity Provider (IdP) Initiated Login
Enable users to launch Oso Cloud directly from Okta:- Navigate to General tab of your created application
 - Configure login settings:
- Login initiated by: Either Okta or app
 - Initiate login URI: 
https://ui.osohq.com/web/oauth/oidc/CUSTOMER_ID/login/ 
 
CUSTOMER_ID with your 3-5 character identifier.
Gather Required Information
Copy these values from your Okta application’s General tab:- Client ID
 - Client Secret
 - OIDC Discovery URL (example: 
https://trial-8895628.okta.com/.well-known/openid-configuration) 
acme).
Send these to your Oso Cloud contact for final setup.
Configure SSO with Microsoft Entra
Create Application Registration
- Log into Azure portal
 - Navigate to Microsoft Entra ID → Manage → App Registrations
 - Click New registration
 - 
Configure registration:
- Provide application name
 - Select supported account types (single or multi-tenant)
 - Redirect URI platform: Web
 - Callback URL: 
https://ui.osohq.com/web/oauth/oidc/callback 
 - Click Register
 
Configure Application
- 
Generate client secret:
- Navigate to Certificates & Secrets
 - Create new client secret
 
 - 
Copy required values:
- Client ID (from Overview tab)
 - Client Secret (from step 1)
 - OpenID Connect metadata URL (from Endpoints)
 
 
acme).
Send these to your Oso Cloud contact for final setup.
Sign In with SSO
- Navigate to https://ui.osohq.com/
 - Select “Log in with SSO”
 - Enter your Customer ID (provided by your team or chosen during setup)
 - Click Continue
 
Important Limitations
- Manual user invites required. SSO does not auto add users.
 - No SCIM/JIT provisioning.
 - Org migrations. Re-invite all users with corporate emails; SSO and non-SSO logins are separate accounts.
 - Non-SSO access remains. Remove users manually if enforcing SSO-only.