Enterprise SSO Configuration
Configure Single Sign-On (SSO) to enable your users to log in with their corporate identity credentials.
Overview
Supported SSO protocols and providers:
| Provider | Protocol | Status |
|---|---|---|
| Microsoft Entra ID | OIDC/SAML | Certified |
| Okta | OIDC/SAML | Supported |
| Google Workspace | OIDC | Coming Q3 2026 |
| Generic OIDC | OIDC | Supported |
| Generic SAML 2.0 | SAML | Supported |
Benefits of SSO
- Simplified login — One set of credentials
- Centralized control — Manage access in your identity provider
- MFA enforcement — Use your organization's MFA policies
- Automatic provisioning — Users created on first login
- Audit trail — Track all authentications
- GDPR compliant — No password storage in Noxys
Prerequisites
- Admin role on your Noxys tenant
- Administrator access to your identity provider
- Redirect URI:
https://noxys.cloud/auth/callback
Microsoft Entra ID (OIDC)
Step 1: Register an Application in Entra ID
- Go to Azure Portal > Entra ID > App registrations > New registration
- Set the name to
Noxys - Set redirect URI to
https://noxys.cloud/auth/callback(Web) - Click Register
Step 2: Configure Credentials
- Go to Certificates & secrets > New client secret
- Copy the Client ID and Client Secret
- Note your Tenant ID from the overview page
Step 3: Configure Noxys
- Go to Settings > Authentication > SSO
- Select OIDC
- Enter:
- Issuer URL:
https://login.microsoftonline.com/{tenant-id}/v2.0 - Client ID: from Step 2
- Client Secret: from Step 2
- Issuer URL:
- Click Save & Test
Okta (OIDC)
Step 1: Create an Application in Okta
- Go to Applications > Create App Integration
- Select OIDC - OpenID Connect and Web Application
- Set redirect URI to
https://noxys.cloud/auth/callback - Assign users or groups
Step 2: Configure Noxys
- Go to Settings > Authentication > SSO
- Select OIDC
- Enter:
- Issuer URL:
https://{your-domain}.okta.com - Client ID: from Okta
- Client Secret: from Okta
- Issuer URL:
- Click Save & Test
Google Workspace (OIDC)
Step 1: Create OAuth Credentials
- Go to Google Cloud Console > APIs & Services > Credentials
- Create an OAuth 2.0 Client ID (Web application)
- Add
https://noxys.cloud/auth/callbackas an authorized redirect URI
Step 2: Configure Noxys
- Go to Settings > Authentication > SSO
- Select OIDC
- Enter:
- Issuer URL:
https://accounts.google.com - Client ID: from Google
- Client Secret: from Google
- Issuer URL:
- Click Save & Test
SAML 2.0 Configuration
For SAML-based SSO, provide the following to your identity provider:
| Parameter | Value |
|---|---|
| ACS URL | https://noxys.cloud/auth/saml/callback |
| Entity ID | https://noxys.cloud |
| NameID Format | emailAddress |
Then in Noxys:
- Go to Settings > Authentication > SSO
- Select SAML 2.0
- Upload the IdP Metadata XML or enter:
- SSO URL: your IdP's sign-on URL
- Certificate: your IdP's signing certificate
- Click Save & Test
Troubleshooting
| Issue | Solution |
|---|---|
| Redirect URI mismatch | Ensure the callback URL matches exactly, including trailing slashes |
| Token validation failed | Check that the Issuer URL is correct and accessible |
| Users not provisioned | Verify that users are assigned to the application in your IdP |
| SAML assertion invalid | Confirm NameID format is set to emailAddress |
Next Steps
- Microsoft Entra ID integration for advanced directory sync
- User management via the API