Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.orq.ai/llms.txt

Use this file to discover all available pages before exploring further.

Feature available with the Enterprise Plan Connect your identity provider to Orq.ai to allow your team to sign in using their existing credentials.

Choosing a Protocol

Two protocols are available for both providers:
  • OIDC: Modern, lightweight protocol based on OAuth 2.0. Recommended for most organizations for its quick setup and JSON-based authentication.
  • SAML: XML-based protocol recommended for enterprise environments requiring fine-grained control over security attributes and assertions.

Identity Providers

Create an OIDC app in Okta

Sign in to your Okta Admin Console and navigate to Applications → Applications.
Okta Admin Console Applications page showing the list of active applications with a Create App Integration button.
Click Create App Integration, then select OIDC - OpenID Connect and Web Application, and click Next.
Create a new app integration dialog with OIDC-OpenID Connect selected as sign-in method and Web Application as application type.
Configure the application:
  • App integration name: Orq.ai (or your preferred name)
  • Grant type: Ensure Authorization Code is selected
  • Sign-in redirect URIs:
    https://my.orq.ai/v2/auth/sso/oidc/callback
    
  • Sign-out redirect URIs (optional):
    https://my.orq.ai
    
New Web App Integration page with App integration name set to orq.ai, sign-in redirect URI set to https://my.orq.ai/v2/auth/sso/oidc/callback, and sign-out redirect URI set to https://my.orq.ai.
New Web App Integration page showing the Assignments section with Skip group assignment for now selected and a Save button.

Assign users

Go to the Assignments tab and click AssignAssign to People or Assign to Groups.Select the users or groups that should have access to Orq.ai, then click Done.
Okta orq.ai application Assignments tab with the Assign dropdown open, showing Assign to People and Assign to Groups options.
By default, no users are assigned to a new Okta app.

Gather credentials

From the application’s General tab, scroll down to the Client Credentials section.Copy these values:
  • Client ID: Copy this value - you’ll use it as the Client ID in Orq.ai
  • Client secret: Click Copy to clipboard - you’ll use it as the Client Secret in Orq.ai
Okta orq.ai application General tab showing Client Credentials with Client ID and a client secret listed under CLIENT SECRETS.

Get the Provider URL

Your Provider URL is your Okta domain’s authorization server issuer URL:
https://{yourOktaDomain}/oauth2/default
Find your Okta domain in the top-right corner of the Okta Admin Console (e.g. acme.okta.com).

Configure in Orq.ai

Navigate to AI StudioOrganizationAuth.
Orq.ai Authentication settings page showing Okta and Active Directory as available SSO providers, each with a Configure button.
Enter the credentials you collected from Okta:
  1. Select OIDC (selected by default)
  2. Enter your Client ID
  3. Enter your Client Secret
  4. Enter your Provider URL
  5. Enter your organization’s email domain(s) in Allowed domains (e.g., orq.ai)
  6. Click Activate
Config Okta Single Sign-On panel with OIDC selected, showing fields for Client ID, Client Secret code, Provider URL, and Allowed domains.

Done! Test your login

Your SSO is now configured! Users can sign in at:
https://my.orq.ai/{your-workspace-key}/login
Orq.ai login page with a Continue with Okta button for Single Sign-On.

Register an application in Azure

Sign in to the Azure portal and navigate to Microsoft Entra ID → App registrations.
Azure Default Directory App registrations page with no applications registered and a Register an application button.
Configure the registration:
  • Name: Orq.ai (or your preferred name)
  • Supported account types: Select based on your organization’s needs
  • Redirect URI: Select Web and enter:
    https://my.orq.ai/v2/auth/sso/oidc/callback
    
Click Register.
Register an application page with Name set to orq.ai, single-tenant account type selected, and Redirect URI set to https://my.orq.ai/v2/auth/sso/oidc/callback.

Gather credentials

Get the Client ID:From the app registration Overview page, copy the Application (client) ID - this is your Client ID for Orq.ai.
Azure orq.ai application overview showing the Application ID and Tenant ID in the Essentials section.
Create a Client Secret:Go to Certificates & secrets → Client secrets → New client secret.Add a description (e.g., Orq.ai SSO), select an expiration period, and click Add.
Certificates and secrets page with the Add a client secret panel open, showing Description set to orq.ai SSO and Expires set to 730 days.
Copy the secret value immediately - Azure only displays it once. If you lose it, you’ll need to generate a new secret.
Copy the Value field - this is your Client Secret for Orq.ai.
Certificates and secrets page showing the newly created orq.ai SSO client secret with expiry 2/10/2028.

Get the Provider URL

Your Provider URL is your tenant’s issuer URL:
https://login.microsoftonline.com/{tenant-id}/v2.0
Replace {tenant-id} with your Directory (tenant) ID, found on the app registration overview page.
Azure orq.ai application overview showing the Application ID and Tenant ID in the Essentials section.

Configure API permissions

Go to API permissions and ensure these Microsoft Graph permissions are granted:
  • openid
  • email
  • profile
Azure API permissions page with the Request API permissions panel open, showing Microsoft Graph delegated permissions including email, openid, profile, and User.Read.
Click Grant admin consent if required by your organization.
Azure API permissions page showing configured Microsoft Graph delegated permissions: email, openid, profile, and User.Read.
Orq.ai automatically requests the User.Read scope to retrieve user email addresses when the standard OIDC email claim is not available.

Configure in Orq.ai

Navigate to AI StudioOrganizationAuth.
Orq.ai Authentication settings page showing Okta and Active Directory as available SSO providers, each with a Configure button.
Enter the credentials you collected from Azure:
  1. Select OIDC (selected by default)
  2. Enter your Client ID
  3. Enter your Client Secret
  4. Enter your Provider URL
  5. Enter your organization’s email domain(s) in Allowed domains (e.g., acme.com)
  6. Click Activate
Azure OIDC configuration form with fields for Client ID, Client Secret, Provider URL, and Allowed domains.

Done! Test your login

Your SSO is now configured! Users can sign in at:
https://my.orq.ai/{your-workspace-key}/login
Orq.ai login page with a Continue with Microsoft button for Single Sign-On.

Testing

Before rolling out to your entire organization:
  1. Test the configuration with a single user
  2. Verify the user is created automatically in Orq.ai (if auto-provisioning is enabled)
  3. Check that the user’s profile information (name, email) is correct

Troubleshooting

Error: “redirect_uri_mismatch” or “Invalid redirect URI”Solution: Verify the callback URL in your IdP exactly matches:
  • OIDC: https://my.orq.ai/v2/auth/sso/oidc/callback
  • SAML: https://my.orq.ai/v2/auth/sso/saml/callback
Common mistakes: extra slash at end, http:// instead of https://, typo in URL
Error: “Audience restriction” or “Invalid audience”Solution: Verify the SP Entity ID matches exactly in both your IdP and Orq.ai configuration. It’s case-sensitive.
Error: “invalid_client” or “unauthorized_client”Solution: Regenerate the client secret in your IdP and update it in Orq.ai. Make sure to copy the secret immediately after creation.
Symptom: User can’t see the app or gets “access denied”Solution:
  • Okta: Go to application → Assignments and assign the user or their group
  • Azure: Go to Enterprise application → Users and groups → Add user/group
Symptom: SAML authentication suddenly stops workingSolution:
  1. Download new certificate from your IdP
  2. Update certificate in Orq.ai (AI Studio → Organization → Auth → Edit)
  3. Click Save Changes
Error: “Email domain not allowed”Solution: Add the user’s email domain to “Allowed domains” in your Orq.ai SSO configuration. Separate multiple domains with commas (e.g., acme.com, acme.io).
Symptom: Authentication succeeds but user has no emailSolution: Orq.ai automatically requests the User.Read Microsoft Graph scope. Verify this permission is granted:
  1. Go to API permissions in your app registration
  2. Verify User.Read is present
  3. Click “Grant admin consent” if needed

Need Help?

Contact support@orq.ai with:
  • Your workspace key
  • Identity provider and protocol (e.g., “Okta SAML”)
  • Error message or screenshot