Setting Up SSO
Configure single sign-on and directory sync for Azure AD, Okta, Google Workspace, and SAML providers.
Last updated: February 22, 2026
Ambient supports SSO via OIDC and SAML 2.0. Once configured, users log in with their corporate credentials and are provisioned automatically.
Supported Providers
| Provider | Protocol | Directory Sync |
|---|---|---|
| Azure Active Directory | OIDC | ✅ SCIM |
| Okta | OIDC | ✅ SCIM |
| Google Workspace | OIDC | ✅ SCIM |
| JumpCloud | Custom OIDC | ✅ SCIM |
| AD FS | SAML 2.0 | Manual |
| Any SAML 2.0 provider | SAML 2.0 | Manual |
Prerequisites
- Ambient Business or Enterprise plan (SSO is not available on Starter)
- Admin access to your identity provider
- Admin access to Ambient Command Center
Configuration Steps
Azure AD / Entra ID
- In the Azure portal, go to Enterprise Applications → New Application → Create your own.
- Name it Ambient and select “Non-gallery application”.
- Go to Single sign-on → OIDC.
- Copy the Client ID and Client Secret.
- In Command Center, go to Administration → Settings → SSO.
- Select Azure AD, paste the Client ID, Client Secret, and your Tenant ID.
- Click Test Connection — a browser window opens to validate the flow.
- Click Save.
Okta
- In Okta Admin, go to Applications → Create App Integration → OIDC.
- Set the Sign-in redirect URI to:
https://your-tenant.ambient.co.za/api/auth/callback/okta - Copy the Client ID and Client Secret.
- In Command Center → Administration → Settings → SSO, select Okta and enter your Okta domain, Client ID, and Client Secret.
- Save and test.
Google Workspace
- In Google Console, go to APIs & Services → Credentials → Create OAuth client.
- Set the redirect URI to:
https://your-tenant.ambient.co.za/api/auth/callback/google - Copy credentials and enter them in Command Center → SSO → Google Workspace.
SAML 2.0 (AD FS / Generic)
- In Command Center → Administration → Settings → SSO, select SAML.
- Download the Ambient SP metadata XML.
- Import the metadata into your IdP (AD FS, PingFederate, etc.).
- Upload your IdP metadata XML back into Command Center.
- Map attributes:
email→http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress - Save and test.
Directory Sync (SCIM)
SCIM provisioning automatically creates, updates, and deactivates Ambient users when changes are made in your IdP.
- In Command Center → Administration → Settings → Directory Sync, click Enable SCIM.
- Copy the SCIM endpoint URL and Bearer token.
- In your IdP (Azure AD, Okta, etc.), configure a new SCIM app using these credentials.
- Run an initial sync — users appear in Administration → Users within minutes.
Enforcing SSO
To require all users to log in via SSO (disabling email/password):
Administration → Settings → SSO → Enforce SSO → Enable
⚠️ Ensure at least one Owner account has a backup login method (or is excluded from enforcement) before enabling this setting.