You can enable SSO on a per-organization basis using your existing identity provider. Supported providers are OIDC, Microsoft Entra ID (formerly Azure AD), Google, and GitHub.
Prerequisites
- A Formance Cloud organization and access to
fctl - A client application created in your identity provider (Client ID and Client Secret)
When creating the app in your IdP, set the redirect URI to your membership endpoint callback:
<membership_uri>/api/authorize/callback. See step 1 to determine your membership URI.Determine your membership URI
Use the same membership URI you pass tofctl login.
After you create the SSO configuration, the exact redirect URI is also displayed in the UI.
Configure the authentication provider
The command format is:- type: one of
oidc,microsoft,github,google - name: human-friendly provider name shown to users
- client-id / client-secret: values from your IdP app
- —oidc-issuer: required for
oidc(e.g.,https://accounts.example.com) - —microsoft-tenant: required for
microsoft(tenant ID or verified domain)
Ensure the redirect URI in your IdP exactly matches
<membership_uri>/api/authorize/callback. Mismatches (scheme, host, path, or trailing slash) will cause sign-in failures.Verify SSO
1
Invite or use an existing user
Use the email domain associated with your IdP, if auto-login by domain is enabled.
2
Sign in via SSO
From the Formance Cloud portal, choose the newly configured provider and complete the sign-in flow.
You should land back in the portal authenticated to your organization. If not, confirm the redirect URI and client credentials in your IdP and re-run the configure command if needed.
Reference
Command help
Command help