Skip to content

SSO Configuration (SAML/OIDC)

Set up single sign-on with your identity provider.

2 min read · For: Admins · ~20 minutes · Updated Mar 22, 2026 · Edit

Basirah supports SAML 2.0 and OpenID Connect (OIDC) for single sign-on. This guide walks through the setup for either protocol.

Choose your protocol

AspectSAML 2.0OIDC
Best forEnterprise IdPs with SAML-first supportModern IdPs and custom OAuth2 flows
ConfigurationUpload IdP metadata or enter SSO URL + certEnter discovery URL, client ID, client secret
Group mappingVia SAML attribute statementsVia groups scope / claims
  1. Create an application in your IdP

    In your identity provider (Okta, Entra ID, Google Workspace, or similar), create a new SAML or OIDC application for Basirah. Your Basirah instance provides the callback URL and service provider metadata needed for this step.

  2. Configure SSO in Basirah

    Enter the IdP configuration details in Basirah’s SSO settings. For SAML, this includes the SSO URL, entity ID, and signing certificate. For OIDC, provide the discovery URL, client ID, and client secret.

  3. Map IdP groups to Basirah roles

    If your IdP sends group claims, configure group-to-role mappings so that users are assigned the correct Basirah role automatically on login. For example, map your security-leads group to the Admin role and vuln-analysts to Analyst.

  4. Enable just-in-time provisioning

    With JIT provisioning, users who authenticate via SSO for the first time get a Basirah account created automatically. Configure the default role for JIT-provisioned users, or disable JIT if you prefer to pre-create accounts.

  5. Test the SSO flow

    Log out and sign in through your IdP to verify the end-to-end flow. Confirm that the correct role is assigned and that group mappings work as expected.