Skip to main content
SSO is available on the Enterprise plan only. Contact us to upgrade.
Connect your identity provider to Orq.ai to allow your team to sign in using their existing credentials.

Choosing a Protocol

Two protocols are available for both providers:
  • OIDC: Modern, lightweight protocol based on OAuth 2.0. Recommended for most organizations for its quick setup and JSON-based authentication.
  • SAML: XML-based protocol recommended for enterprise environments requiring fine-grained control over security attributes and assertions.

Identity Providers

Create an OIDC app in Okta

Sign in to your Okta Admin Console and navigate to Applications → Applications.
Okta Applications page
Click Create App Integration, then select OIDC - OpenID Connect and Web Application, and click Next.
Select OIDC and Web Application
Configure the application:
  • App integration name: Orq.ai (or your preferred name)
  • Grant type: Ensure Authorization Code is selected
  • Sign-in redirect URIs:
    https://my.orq.ai/v2/auth/sso/oidc/callback
    
  • Sign-out redirect URIs (optional):
    https://my.orq.ai
    
Configure app settings
Set controlled access and save

Assign users

Go to the Assignments tab and click AssignAssign to People or Assign to Groups.Select the users or groups that should have access to Orq.ai, then click Done.
Assign users to Okta application
By default, no users are assigned to a new Okta app.

Gather credentials

From the application’s General tab, scroll down to the Client Credentials section.Copy these values:
  • Client ID: Copy this value - you’ll use it as the Client ID in Orq.ai
  • Client secret: Click Copy to clipboard - you’ll use it as the Client Secret in Orq.ai
Client ID and Client Secret in General tab

Get the Provider URL

Your Provider URL is your Okta domain’s authorization server issuer URL:
https://{yourOktaDomain}/oauth2/default
Find your Okta domain in the top-right corner of the Okta Admin Console (e.g. acme.okta.com).

Configure in Orq.ai

Navigate to AI StudioOrganizationAuth.
SSO Authentication page
Enter the credentials you collected from Okta:
  1. Select OIDC (selected by default)
  2. Enter your Client ID
  3. Enter your Client Secret
  4. Enter your Provider URL
  5. Enter your organization’s email domain(s) in Allowed domains (e.g., orq.ai)
  6. Click Activate
Configure Okta OIDC

Done! Test your login

Your SSO is now configured! Users can sign in at:
https://my.orq.ai/{your-workspace-key}/login
SSO Login with Okta

Register an application in Azure

Sign in to the Azure portal and navigate to Microsoft Entra ID → App registrations.
App registrations page
Configure the registration:
  • Name: Orq.ai (or your preferred name)
  • Supported account types: Select based on your organization’s needs
  • Redirect URI: Select Web and enter:
    https://my.orq.ai/v2/auth/sso/oidc/callback
    
Click Register.
Register the application

Gather credentials

Get the Client ID:From the app registration Overview page, copy the Application (client) ID - this is your Client ID for Orq.ai.
Application overview
Create a Client Secret:Go to Certificates & secrets → Client secrets → New client secret.Add a description (e.g., Orq.ai SSO), select an expiration period, and click Add.
Add a client secret
Copy the secret value immediately - Azure only displays it once. If you lose it, you’ll need to generate a new secret.
Copy the Value field - this is your Client Secret for Orq.ai.
Copy the secret value

Get the Provider URL

Your Provider URL is your tenant’s issuer URL:
https://login.microsoftonline.com/{tenant-id}/v2.0
Replace {tenant-id} with your Directory (tenant) ID, found on the app registration overview page.
Application overview showing Client ID and Tenant ID

Configure API permissions

Go to API permissions and ensure these Microsoft Graph permissions are granted:
  • openid
  • email
  • profile
Request API permissions
Click Grant admin consent if required by your organization.
Configured API permissions
Orq.ai automatically requests the User.Read scope to retrieve user email addresses when the standard OIDC email claim is not available.

Configure in Orq.ai

Navigate to AI StudioOrganizationAuth.
SSO Authentication page
Enter the credentials you collected from Azure:
  1. Select OIDC (selected by default)
  2. Enter your Client ID
  3. Enter your Client Secret
  4. Enter your Provider URL
  5. Enter your organization’s email domain(s) in Allowed domains (e.g., acme.com)
  6. Click Activate
Configure Azure AD OIDC

Done! Test your login

Your SSO is now configured! Users can sign in at:
https://my.orq.ai/{your-workspace-key}/login
SSO Login with Azure AD

Testing

Before rolling out to your entire organization:
  1. Test the configuration with a single user
  2. Verify the user is created automatically in Orq.ai (if auto-provisioning is enabled)
  3. Check that the user’s profile information (name, email) is correct

Troubleshooting

Error: “redirect_uri_mismatch” or “Invalid redirect URI”Solution: Verify the callback URL in your IdP exactly matches:
  • OIDC: https://my.orq.ai/v2/auth/sso/oidc/callback
  • SAML: https://my.orq.ai/v2/auth/sso/saml/callback
Common mistakes: extra slash at end, http:// instead of https://, typo in URL
Error: “Audience restriction” or “Invalid audience”Solution: Verify the SP Entity ID matches exactly in both your IdP and Orq.ai configuration. It’s case-sensitive.
Error: “invalid_client” or “unauthorized_client”Solution: Regenerate the client secret in your IdP and update it in Orq.ai. Make sure to copy the secret immediately after creation.
Symptom: User can’t see the app or gets “access denied”Solution:
  • Okta: Go to application → Assignments and assign the user or their group
  • Azure: Go to Enterprise application → Users and groups → Add user/group
Symptom: SAML authentication suddenly stops workingSolution:
  1. Download new certificate from your IdP
  2. Update certificate in Orq.ai (AI Studio → Organization → Auth → Edit)
  3. Click Save Changes
Error: “Email domain not allowed”Solution: Add the user’s email domain to “Allowed domains” in your Orq.ai SSO configuration. Separate multiple domains with commas (e.g., acme.com, acme.io).
Symptom: Authentication succeeds but user has no emailSolution: Orq.ai automatically requests the User.Read Microsoft Graph scope. Verify this permission is granted:
  1. Go to API permissions in your app registration
  2. Verify User.Read is present
  3. Click “Grant admin consent” if needed

Need Help?

Contact support@orq.ai with:
  • Your workspace key
  • Identity provider and protocol (e.g., “Okta SAML”)
  • Error message or screenshot