Enterprise SSO Setup
Configure SAML 2.0 or OIDC single sign-on for your organization, including group-role mapping and just-in-time provisioning.
Overview
Enterprise SSO allows your organization's members to sign in to AEO Optima using their existing corporate identity provider (IdP). AEO Optima supports both SAML 2.0 and OpenID Connect (OIDC) protocols, with automatic group-to-role mapping and just-in-time user provisioning.
When SSO is enforced, password-based login is disabled for all organization members, ensuring all authentication flows through your corporate IdP.
Supported Protocols
| Protocol | Best For | Requirements |
|---|---|---|
| SAML 2.0 | Enterprise IdPs like Okta, Azure AD, OneLogin, PingFederate | Metadata URL or XML |
| OIDC | Modern IdPs, Google Workspace, Auth0 | Issuer URL, Client ID, Client Secret |
Configuration
SAML 2.0 Setup
-
In your IdP, create a new SAML application:
- Set the ACS (Assertion Consumer Service) URL to your AEO Optima instance's auth callback URL.
- Set the Entity ID to your organization's identifier.
- Configure attribute mappings for email, name, and groups.
-
In AEO Optima, navigate to Settings and then SSO Configuration:
- Select SAML as the provider type.
- Enter the Metadata URL (preferred) or paste the Metadata XML from your IdP.
- Add your organization's email domain(s) (e.g.,
yourcompany.com). - Save the configuration.
OIDC Setup
-
In your IdP, register a new OIDC application:
- Set the redirect URI to your AEO Optima instance's auth callback URL.
- Note the Client ID and Client Secret.
- Ensure the
openid,email, andprofilescopes are enabled.
-
In AEO Optima, navigate to Settings and then SSO Configuration:
- Select OIDC as the provider type.
- Enter the Issuer URL (e.g.,
https://accounts.google.comorhttps://your-tenant.okta.com). - Enter the Client ID and Client Secret.
- Add your organization's email domain(s).
- Save the configuration.
The system validates your OIDC configuration by fetching the discovery document at {issuer_url}/.well-known/openid-configuration and checking for required fields (issuer, authorization_endpoint, token_endpoint).
Group-Role Mapping
Map your IdP's groups to AEO Optima organization roles. When a user authenticates via SSO, their IdP groups are checked against these mappings to determine their role.
Available Roles
| Role | Permissions |
|---|---|
| Owner | Full access including billing and organization deletion. |
| Admin | Manage members, projects, settings, and configurations. |
| Member | Create and manage prompts, snapshots, and analyses. |
| Viewer | Read-only access to dashboards and reports. |
Mapping Configuration
Add mappings in the format IdP Group Name -> Organization Role:
| IdP Group | AEO Optima Role |
|---|---|
Engineering | admin |
Marketing | member |
Executives | owner |
Contractors | viewer |
Role Resolution
When a user belongs to multiple IdP groups with different role mappings, the highest-privilege role is assigned. The hierarchy is: owner > admin > member > viewer.
If no group mapping matches, the user is assigned the default role (configurable, defaults to member).
Just-in-Time Provisioning
When enabled (the default), JIT provisioning automatically creates organization membership for new users the first time they authenticate via SSO. This eliminates the need to pre-create accounts or send invitations.
- Auto-provision — Automatically adds the user as an organization member with the resolved role.
- Audit logging — Each JIT-provisioned membership is logged with the user's email, assigned role, and IdP groups for compliance tracking.
Enforcement Mode
When SSO is set to enforced:
- Password-based login is disabled for all members of the organization.
- Users with email addresses matching the configured domains must authenticate via the IdP.
- This ensures full compliance with corporate authentication policies.
When SSO is enabled but not enforced, members can use either SSO or password-based login.
Domain-Based SSO Lookup
AEO Optima can automatically detect when a user's email domain matches an SSO-configured organization and redirect them to the appropriate IdP. This provides a seamless login experience:
- User enters their email address on the login page.
- The system checks if the email domain matches any SSO-configured organization.
- If a match is found, the user is redirected to their corporate IdP.
- After successful authentication, the user is returned to AEO Optima with their role automatically resolved.
How to Use
- Navigate to Settings, then SSO Configuration.
- Choose your protocol (SAML or OIDC) and enter the required provider details.
- Add your email domain(s) so the system can match users to your organization.
- Configure group-role mappings based on your IdP's group structure.
- Test by signing in with an SSO-enabled account.
- Enable enforcement once you have confirmed SSO works correctly for all members.
Plan Requirements
Enterprise SSO is available on Enterprise plans only.