Identity Providers

Index of identity-related configuration in Archestra — SSO sign-in, downstream token exchange, role mapping, team sync, and per-provider walkthroughs

6 min read

Identity Providers Overview

Archestra integrates with your identity provider (IdP) for two related purposes:

  • Sign-in (SSO) — users authenticate with their existing IdP credentials. See SSO.
  • Downstream MCP tool calls (Enterprise-Managed Auth) — Archestra exchanges the signed-in user's IdP token for a downstream API token at tool-call time, so the tool runs as that user, not a service account. See Enterprise-Managed Auth.

Enterprise feature: please reach out to sales@archestra.ai for instructions about how to enable the feature.

Supported providers

ProviderProtocolSSO sign-inRole mappingTeam syncToken exchange (downstream MCP)Setup guide
Microsoft Entra IDOIDCYesYesYes (groups claim)Entra OBOEntra ID SSO + OBO
OktaOIDCYesYesYesOkta-managed (private key JWT, ID token)Okta SSO + Token Exchange
GoogleOIDCYesYesYesRFC 8693 (in form, rarely used in practice)This page
GitHubOIDCYesYesYesRFC 8693 (in form, rarely used in practice)This page
GitLabOIDCYesYesYesRFC 8693 (in form, rarely used in practice)This page
Generic OIDCOIDCYesYesYesRFC 8693 (or Okta-managed / Entra OBO if issuer matches)This page
Generic SAMLSAML 2.0YesYesYes— (not supported for SAML)This page

The token-exchange strategy is auto-inferred from the OIDC issuer URL: Okta hostnames → Okta-managed, Microsoft hostnames → Entra OBO, anything else → RFC 8693. See Enterprise-Managed Auth.

Provider setup

All providers are configured from the Settings > Identity Providers card. For SSO concepts, callback URL formats, and troubleshooting, see SSO.

Microsoft Entra ID

OIDC sign-in with downstream Entra OBO token exchange for MCP tool calls. See Entra ID SSO + OBO for the end-to-end walkthrough (app registration, client secret, group claims, OBO resource configuration).

Okta

OIDC sign-in with Okta-managed downstream token exchange (private key JWT, ID token). See Okta SSO + Token Exchange for the end-to-end walkthrough (app integration, signing keys, token exchange policy).

Google

  1. Go to Google Cloud Console
  2. Create or select a project
  3. Navigate to APIs & Services > Credentials
  4. Create an OAuth 2.0 Client ID (Web application)
  5. Add the callback URL: https://your-domain.com/api/auth/sso/callback/Google
  6. Copy the Client ID and Client Secret
  7. In Archestra, click Enable on the Google card and paste the credentials and allowed email domains

Google notes:

  • Discovery endpoint is auto-configured
  • Optional Hosted Domain Hint passes Google's hd parameter to prefer account selection for a Workspace domain. Archestra still enforces Allowed Email Domains after Google returns the authenticated email.

GitHub

  1. Go to GitHub Developer Settings > New OAuth App
  2. Set the Authorization callback URL to https://your-domain.com/api/auth/sso/callback/GitHub
  3. Copy the Client ID and generate a Client Secret
  4. In Archestra, click Enable on the GitHub card and paste the credentials

GitHub limitations:

  • Users must have a public email set in their GitHub profile — GitHub's OAuth /user endpoint does not expose private emails
  • PKCE is automatically disabled for GitHub (not supported by GitHub)

GitLab

  1. Go to GitLab Applications (or your self-hosted instance) > Add new application
  2. Set the Redirect URI to https://your-domain.com/api/auth/sso/callback/GitLab
  3. Select scopes: openid, email, profile
  4. Copy the Application ID (Client ID) and Secret
  5. In Archestra, click Enable on the GitLab card and paste the credentials

GitLab notes:

  • For self-hosted GitLab, set the issuer URL to your GitLab instance (https://gitlab.yourcompany.com)
  • OIDC discovery is supported, so endpoints are auto-configured

Generic OIDC

For OIDC providers not listed above (Auth0, Keycloak, custom), use the Generic OAuth option.

Required:

  • Provider ID: a unique identifier (auth0, keycloak)
  • Issuer: the OIDC issuer URL
  • Client ID and Client Secret: from your IdP

Optional:

  • Discovery Endpoint: the .well-known/openid-configuration URL (defaults to issuer + /.well-known/openid-configuration)
  • Authorization / Token / User Info / JWKS endpoints: override the discovery defaults
  • Scopes: additional OAuth scopes (default: openid, email, profile). Add offline_access when Archestra should refresh the user's linked IdP token. Add the provider's groups scope, often groups, when role mapping or team sync reads group claims. For linked downstream IdPs, keep these scopes focused on login/linking and the token-exchange assertion. For Entra OBO, include the Archestra app's own exposed delegated scope; configure each downstream resource on the MCP catalog item that needs the token.
  • PKCE: enable if your provider requires it
  • Enable RP-Initiated Logout: sends post_logout_redirect_uri during sign-out (on by default; disable for providers that reject it)

Linked downstream IdPs can be hidden from the sign-in page. When a tool needs that IdP token, Archestra starts a short SSO link flow from the current session, stores the downstream account on that same user, and restores the original session after the IdP callback. This supports primary and downstream IdP accounts with different emails.

Generic SAML

For SAML 2.0 providers.

Required:

  • Provider ID: a unique identifier (okta-saml, adfs)
  • Issuer: your organization's identifier
  • SAML Issuer / Entity ID: the IdP's entity ID (from IdP metadata)
  • SSO Entry Point URL: the IdP's Single Sign-On URL
  • IdP Certificate: the X.509 certificate from your IdP for signature verification

Optional:

  • IdP Metadata XML: full XML metadata document (recommended over the individual fields above)
  • Callback URL (ACS URL): auto-generated, can be overridden
  • SP Entity ID and SP Metadata XML: for custom Service Provider configuration

SAML notes:

  • SAML responses must be signed by the IdP
  • NameID format should be emailAddress
  • User attributes (email, firstName, lastName) should be included in the assertion
  • SAML providers cannot do downstream token exchange — use OIDC for that
  • SSO — sign-in flow, callback URLs, allowed domains, troubleshooting
  • Enterprise-Managed Auth — downstream token exchange (OBO, ID-JAG, RFC 8693)
  • Role Mapping — map IdP claims to Archestra roles
  • Team Sync — sync IdP groups to Archestra teams