You can enable SSO on a per-organization basis using your existing identity provider. Supported providers are OIDC, Microsoft Entra ID (formerly Azure AD), Google, and GitHub.
Prerequisites
- A Formance Cloud organization and access to
fctl
- A client application created in your identity provider (Client ID and Client Secret)
When creating the app in your IdP, set the redirect URI to your membership endpoint callback:
<membership_uri>/api/authorize/callback
. See step 1 to determine your membership URI.Determine your membership URI
Use the same membership URI you pass tofctl login
.
After you create the SSO configuration, the exact redirect URI is also displayed in the UI.
Configure the authentication provider
The command format is:- type: one of
oidc
,microsoft
,github
,google
- name: human-friendly provider name shown to users
- client-id / client-secret: values from your IdP app
- —oidc-issuer: required for
oidc
(e.g.,https://accounts.example.com
) - —microsoft-tenant: required for
microsoft
(tenant ID or verified domain)
Ensure the redirect URI in your IdP exactly matches
<membership_uri>/api/authorize/callback
. Mismatches (scheme, host, path, or trailing slash) will cause sign-in failures.Verify SSO
1
Invite or use an existing user
Use the email domain associated with your IdP, if auto-login by domain is enabled.
2
Sign in via SSO
From the Formance Cloud portal, choose the newly configured provider and complete the sign-in flow.
You should land back in the portal authenticated to your organization. If not, confirm the redirect URI and client credentials in your IdP and re-run the configure command if needed.
Reference
Command help
Command help