Portkey Control plane supports following authentication protocols for enterprise customers.Documentation Index
Fetch the complete documentation index at: https://portkey-docs-narengogi-patch-4.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
- OIDC (OpenID Connect)
- SAML 2.0 (Security Assertion Markup Language)
Auto-Provisioning: First-time SSO users are automatically provisioned to your organization when they log in. If a user has a pending invite, it will be automatically accepted during their first SSO login.
Table of Contents
OIDC Integration
For OIDC integration, we require the following information from your identity provider:Required Information
- Issuer URL: The URL of your identity provider’s OIDC authorization endpoint. Wellknown OIDC configuration should be available at this URL.
- Client ID: The client ID provided by your identity provider.
- Client Secret Key: The client secret provided by your identity provider.
Setup Steps
Following scopes are required for Portkey to work with OIDC:
- openid
- profile
- offline_access
OIDC_CUSTOM_SCOPES environment variable (comma-separated list) on the backend service.General
- Create an OIDC application in your identity provider.
- Once the application is created, please note the following details:
Issuer URLClient IdClient Secret
- Update the above details in Portkey Control Plane in
Admin Settings > Authentication Settings > OIDC.
Okta
- Go to
Applicationstab on Okta dashboard andcreate a new app integration. - Select
OIDC - OpenID Connectas the signin method. - Select Application Type as
WebApplication - On the next step, fill in the required fields. The
signin redirect URIshould be https://app.portkey.ai/v2/auth/callback and theGrant Typeshould haveAuthorization codeandRefresh Tokenas checked - Create Application
- After the application is created, go to the
Generalsection of the application. - Click on the
editbutton for the General Settings section. - Select
Either Okta or appfor theLogin initiated byfield. - Add https://app.portkey.ai/v2/auth/callback as the
initiate login URI - Go to the
Sign Onsection and click onEdit. SelectOkta Urlas theissuerand save the updated details - Once everything is setup please note the following details
Issuer URLwill be theIssuerfrom above stepClient Idwould be same asAudience/Client IDClient Secretis needed for Web App based flow. It can be found underGeneral > Client Credentials > Client Secretsin your Okta App.
- Update the above details in Portkey Control Plane in
Admin Settings > Authentication Settings > OIDC
Azure AD
- Sign in to the Azure portal.
- Search for and select Azure Active Directory.
- Under Manage, select App registrations.
- Select New registration.
- Enter a name.
- Select one of the Supported account types that best reflects your organization requirements.
- Under
Redirect URI,- Select
Webas the platform - Enter https://app.portkey.ai/v2/auth/callback as redirect url
- Select
- Click on Register
- Once saved, go to
Certificates & secrets- Click on
Client Secrets - Click on
New client secret - Use appropriate settings according to your organization
- Click on
Add
- Click on
- Once everything is set up. Please go to
Overview- Click on
Endpointsand note theOpenID Connect metadata documenturl - Please note the
Application (client) IDfromEssentials - Please note the
Client SecretfromCertificates & secrets
- Click on
- Update the above details in Portkey Control Plane in
Admin Settings > Authentication Settings > OIDC
SAML Integration
For SAML integration, we require the following information from your identity provider:Required Information
Either of the following information is required:- Provider Metadata URL: The URL from your identity provider containing the metadata, including SAML configuration details.
- Provider Metadata XML: The XML metadata of your identity provider.
Setup Steps
General
- Create an SAML application in your identity provider.
- Once the application is created, please note the following details:
Provider Metadata URLProvider Metadata XML
- Update the above details in Portkey Control Plane in
Admin Settings > Authentication Settings > SAML.
Okta
- Go to
Applicationstab on okta dashboard andcreate a new app integration. - Select
SAML 2.0as the signin method. - In
Configure SAML, updateSingle sign-on URLwith Saml redirect url. You can find the Saml redirect url from theAdmin Settings > Authentication Settings > SAML Redirect/Consumer Service URLfrom Portkey Control Plane.Audience URI (SP Entity ID)with SAML Entity ID from Portkey Control Plane.
- Create Application
- Once everything is set up, please note the following details
Sign On tab > SAML 2.0 tab > Metadata details > Metadata URL
- Update the above details in Portkey Control Plane in
Admin Settings > Authentication Settings > SAML
Azure AD
- Sign in to the Azure portal.
- Search for and select Azure Active Directory.
- Under Manage, select App registrations.
- Select New registration.
- Enter a name.
- Select one of the Supported account types that best reflects your organization requirements.
- Under
Redirect URI,- Select
Webas the platform - Enter the
SAML Redirect/Consumer Service URLfrom Portkey Control Plane as redirect url
- Select
- Select
Register. - Select
Endpointsat the top of the page. - Find the
Federation metadata document URLand select the copy icon. - In the left side panel, select
Expose an API. - To the right of
Application ID URI, selectAdd.- Enter
SAML Entity IDfrom Portkey Control Plane as theApp ID URI.
- Enter
- Select
Save. - Once everything is set up, please note the following details
- Copy the
Federation metadata document URLand paste it in Portkey Control Plane inAdmin Settings > Authentication Settings > SAML > Provider Metadata URL
- Copy the
Allowed Domains
InAdmin Settings > Authentication Settings, you can configure Allowed Domains to restrict which email domains are permitted to authenticate with your organization. You can add one or more domains (e.g., example.com) to control access.
Subdomain Support
You can enable theallow_subdomains flag on a root domain to automatically allow authentication from all subdomains under that root domain.
For example, if you add example.com as an allowed domain and enable allow_subdomains, users with emails from any subdomain like dev.example.com, team.example.com, or us.example.com will also be allowed to authenticate.
| Configuration | allow_subdomains | Allowed Emails |
|---|---|---|
example.com | Disabled | Only *@example.com |
example.com | Enabled | *@example.com, *@dev.example.com, *@team.example.com, etc. |
dev.example.com | Enabled | Error — flag only works on root domains |
dev.example.com | Disabled | Only *@dev.example.com |

