Skip to main content

SSO and SCIM

Tegendo.AI supports enterprise Single Sign-On (SSO) via SAML 2.0 and OpenID Connect (OIDC), along with SCIM 2.0 for automated user provisioning and deprovisioning. This guide covers setup for both.

Single Sign-On (SSO)

SSO allows your team to authenticate with Tegendo.AI using your existing identity provider (IdP). Once configured, users sign in through your IdP instead of managing a separate password.

Supported identity providers

Tegendo.AI has been tested with the following providers. Any SAML 2.0 or OIDC-compliant provider should work.
ProviderProtocolStatus
OktaSAML / OIDCVerified
Azure AD (Entra ID)SAML / OIDCVerified
Google WorkspaceOIDCVerified
OneLoginSAMLVerified
JumpCloudSAMLVerified
PingIdentitySAML / OIDCVerified
Custom SAML 2.0SAMLSupported
Custom OIDCOIDCSupported

Setting up SAML SSO

1

Open SSO settings

Navigate to Settings > Security > SSO in the admin dashboard.
2

Select SAML 2.0

Click Configure SAML to begin setup. Tegendo.AI will display your:
  • ACS URL (Assertion Consumer Service URL)
  • Entity ID (SP Entity ID)
  • Metadata URL
Copy these values — you’ll need them in your IdP.
3

Configure your IdP

In your identity provider, create a new SAML application and enter the ACS URL and Entity ID from the previous step.Set the following attribute mappings:
IdP AttributeTegendo.AI Field
email or nameIdEmail (required)
firstNameFirst name
lastNameLast name
groupsGroups (for role mapping)
4

Upload IdP metadata

Download your IdP’s metadata XML file (or copy the metadata URL) and paste it into the Tegendo.AI SAML configuration form.Alternatively, manually enter:
  • IdP SSO URL — The URL where Tegendo.AI sends authentication requests
  • IdP Certificate — The X.509 certificate used to verify SAML assertions
  • IdP Entity ID — Your identity provider’s entity identifier
5

Test the connection

Click Test Connection to initiate a test login flow. You’ll be redirected to your IdP and back. If successful, you’ll see a confirmation with the authenticated user’s details.
6

Enable SSO

Toggle SSO to Enabled. Optionally, check Enforce SSO to disable password-based login entirely.
Before enforcing SSO, ensure at least one admin account can authenticate via SSO. If SSO is misconfigured and enforced, you may be locked out. Tegendo.AI provides a recovery URL that bypasses SSO for a designated recovery admin.

Setting up OIDC SSO

1

Open SSO settings

Navigate to Settings > Security > SSO and click Configure OIDC.
2

Note the redirect URI

Tegendo.AI displays the Redirect URI that you’ll need to register in your IdP.
3

Register an OIDC application in your IdP

Create a new OIDC/OAuth2 application in your identity provider. Set the redirect URI to the one provided by Tegendo.AI. Note the Client ID and Client Secret.
4

Enter OIDC configuration

In Tegendo.AI, enter:
  • Discovery URL — Your IdP’s .well-known/openid-configuration endpoint
  • Client ID — From the OIDC application you created
  • Client Secret — From the OIDC application you created
  • Scopesopenid email profile (default)
5

Test and enable

Click Test Connection, verify the flow, and toggle SSO to Enabled.

SCIM provisioning

SCIM (System for Cross-domain Identity Management) automates user lifecycle management. When you add or remove users from a group in your IdP, they are automatically provisioned or deprovisioned in Tegendo.AI.

Setting up SCIM

1

Enable SCIM

Navigate to Settings > Security > SCIM and click Enable SCIM. Tegendo.AI generates:
  • SCIM Base URL — The endpoint your IdP sends provisioning requests to
  • Bearer Token — The authentication token for SCIM requests
Copy both values securely.
2

Configure your IdP

In your identity provider’s SCIM provisioning settings, enter the base URL and bearer token. Configure the following provisioning actions:
  • Create Users — Enabled
  • Update User Attributes — Enabled
  • Deactivate Users — Enabled
  • Push Groups — Enabled (for role mapping)
3

Map attributes

Map your IdP’s user attributes to Tegendo.AI fields:
IdP AttributeSCIM AttributeRequired
Emailemails[type eq "work"].valueYes
First namename.givenNameYes
Last namename.familyNameYes
Display namedisplayNameNo
4

Assign groups

Assign IdP groups to Tegendo.AI. Users in these groups will be automatically provisioned.

Auto-provisioning users

When a user is added to a SCIM-assigned group in your IdP, Tegendo.AI automatically:
  1. Creates a user account with the mapped attributes
  2. Assigns the default role (Member) unless group-to-role mapping is configured
  3. Sends a welcome email with instructions to sign in via SSO
No admin action is required in Tegendo.AI — provisioning is fully automated.

Deprovisioning users

When a user is removed from all SCIM-assigned groups in your IdP, Tegendo.AI:
  1. Deactivates the user account (the user can no longer sign in)
  2. Preserves the user’s conversation history and data per your retention policy
  3. Releases the seat from your subscription count
Deprovisioned users are soft-deleted. Their data remains accessible to admins for the configured retention period. After the retention period, data is permanently deleted.

Group-to-role mapping

Map your IdP groups to Tegendo.AI roles so that users are automatically assigned the correct permissions:
  1. Navigate to Settings > Security > SCIM > Role Mapping
  2. For each IdP group, select the corresponding Tegendo.AI role:
IdP GroupTegendo.AI Role
tegendo-adminsAdmin
tegendo-managersManager
tegendo-usersMember
tegendo-viewersViewer
  1. Click Save Mapping
When a user’s group membership changes in your IdP, their Tegendo.AI role is automatically updated on the next SCIM sync.

Troubleshooting

Common SSO issues

ProblemSolution
”Invalid SAML response”Verify the ACS URL and Entity ID in your IdP match the values shown in Tegendo.AI
”Certificate validation failed”Re-download the IdP certificate and re-upload it
”User not found”Ensure the email attribute is mapped correctly in your IdP
”SSO loop”Clear browser cookies and try again, or check for redirect URL mismatches

Common SCIM issues

ProblemSolution
”401 Unauthorized”Regenerate the bearer token and update it in your IdP
”User not provisioned”Check that the user is in a SCIM-assigned group
”Attributes not syncing”Verify attribute mappings in your IdP’s SCIM configuration
For additional help, contact support@tegendo.ai.