Skip to content

Manage Single Sign‑On (SSO)

Configure SAML-based Single Sign-On (SSO) for your organization. This lets users authenticate with your Identity Provider (IdP) such as Azure AD, Google Workspace, or Okta.


Prerequisites

  • Organization admin access in CloudPie
  • Access to your IdP SAML settings (Metadata URL or manual fields)
  • (Optional) List of SAML group names to map to CloudPie roles
  • At least one local admin account kept for emergency access

  1. Open the Dashboard.
  2. In the sidebar, click Settings → Manage Single Sign‑On.
  3. The SSO Configuration page opens.

Example Image: Manage SSO Configuration Page
Manage SSO Configuration Page


Configure SSO

  1. In IdP Metadata URL, paste your IdP’s metadata endpoint.
  2. Click Re‑parse Metadata (or Save Configuration) to fetch:
  3. IdP Entity ID
  4. SSO URL
  5. SLO URL (if provided)
  6. X.509 Certificate

Example

https://login.microsoftonline.com/<tenant-id>/federationmetadata/2007-06/federationmetadata.xml

Option B — Manual (Advanced)

If a metadata URL isn’t available, expand Or configure manually (advanced) and enter: - IdP Entity ID - IdP SSO URL - IdP SLO URL (optional) - IdP Certificate (X.509)

CloudPie validates required fields before enabling SSO.


Default Roles for New SSO Users

  • Select zero or more organization roles to assign on a user’s first SSO login.
  • Leave empty to assign no roles by default.
  • Roles can be edited later from Manage Users.

Auto‑Provisioning

  • On: New users are created automatically on first SSO login (defaults applied if set).
  • Off: Only existing users can log in via SSO.

Access Control

Choose who can log in via SSO: - Open — Allow all users from your IdP. - Email Domain — Allow only specific email domains (comma separated). - Group Whitelist — Allow only users in specific SAML groups.


Attribute Mapping

Tell CloudPie which SAML attributes contain user data: - Email Attribute Name (default: email) - Groups Attribute Name (optional; default: groups)


Group Mapping

Map IdP group names to CloudPie roles.

  1. Enable Group Mapping.
  2. For each row, enter SAML Group Name and select one or more CloudPie Roles.
  3. Click Add Mapping to insert more rows. Save when done.

How role sync works - If Group Mapping is enabled: user roles are rewritten on every login based on the mapping (invalid roles are ignored). - If Group Mapping is disabled: CloudPie does not change user roles on login; only saml_groups and last_login are updated. - Default roles apply only on a user’s first login (when auto‑provisioning).


Service Provider (SP) Metadata

Share these with your IdP to establish trust:

  • Metadata URL

    https://<your-subdomain>.cloudpie.io/api/v1/sso/metadata
    

  • Assertion Consumer Service (ACS) URL

    https://<your-subdomain>.cloudpie.io/api/v1/sso/acs
    


Actions

  • Save Configuration — Persist the current settings.
  • Reset Form — Reload last saved values.
  • Check Status — Verify required SAML fields are present.
  • Re‑parse Metadata — Re-fetch and apply metadata from the IdP (modal confirmation).
  • Test SSO Login — Launch a test SAML login.
  • Delete Config — Remove the SSO configuration.

Troubleshooting

  • Login flickers/returns to Sign‑in: Incorrect ACS URL or certificate → re‑parse metadata, confirm IdP app settings.
  • Role changes don’t stick: Group Mapping is enabled → roles are overwritten on login.
  • User recreated after deletion: Auto‑provision is enabled → disable it to prevent auto‑creation.
  • Cannot log in with password: SSO enabled for org; use IdP login or disable SSO temporarily.