Give 1000s access to CustomGPT
without extra seats

Provide secure, authenticated access using your existing login process. No new accounts to create, no passwords to manage, and no extra admin overhead.

Cable-stayed bridge connecting snowy islands to a glass-domed structure, representing seamless access through your organization's existing login system

Trusted by teams at 10,000+ organizations

Trusted by

How organizations are using this feature

IT & Security

Extend your existing identity system to AI agents with SAML 2.0, SCIM, and role-based access

Operations

Scale AI access to thousands of users without creating or managing new accounts

Professional Services

Give clients secure, role-based access to the AI agents built for them

Education

Let students access AI tools with the university login they already use

Manufacturing

Give partners access to the right agents so each group sees only relevant content

Government

Provide contractors and citizens secure access through a government-approved identity provider

The CustomGPT platform has enabled us to create ChatMTC, a generative AI solution for entrepreneurs to easily access knowledge based on the deep entrepreneurship resources available at MIT.

Doug Williams, Product Lead for the Martin Trust Center for MIT Entrepreneurship and happy CustomGPT.ai customer

Doug Williams

Product Lead, Martin Trust Center for MIT Entrepreneurship

Any IdP, Zero Lock-In

Role-Based Access

One Link for All Users

No-Code Embed

Access That Stays in Sync

24-Hour Sessions

White-Label Deployment

How to get started​

1

Enable SSO

Contact sales to get started.

2

Configure

Your IT team configures access via the dashboard.

3

Deploy

Choose your method:

  • Portal: Share one link with all users.
  • Embed: Add to any website with a no-code snippet.

Plans & pricing

End User IdP Login is available on Enterprise plans for organizations that need secure, role-based access at scale.

Frequently asked questions

Learn more about this feature in our docs.

A feature that lets end-users (partners, vendors, students) access specific AI agents by authenticating through their corporate Identity Provider, without needing a CustomGPT account.

IdP-based end-user access is available exclusively to Enterprise customers with SSO already configured.

Any SAML 2.0 compliant Identity Provider works, including Microsoft Entra ID, Okta, Google Workspace, and PingOne.

No. Regular SSO lets your internal team members log into CustomGPT with corporate credentials. IdP-based end-user access lets end-users access specific agents without becoming CustomGPT users at all.

No. You must have SSO already set up for your CustomGPT Enterprise account before enabling IdP-based end-user access.

Go to My Profile → SSO tab, enter the IdP attribute name you want to use for role mapping, and copy the unique portal login URL to share with end-users.

An attribute is a piece of information your IdP sends about each user — like department, group, or custom field. You configure your IdP to send an attribute which value will matche a role name in CustomGPT.

Yes. Create a role in Teams → Roles with a name that exactly matches the IdP attribute value. The role should be set to “local” scope and have chat-only permissions with specific agents assigned.

Yes. Create multiple roles with different names, each assigned to different agents. Configure your IdP to send the appropriate attribute value for each user group.

Copy the unique portal login URL from your SSO settings and share it via email, intranet, or any communication channel. This URL is specific to your organization.

The portal inherits your agent’s appearance settings including colors and branding, providing a consistent experience for end-users.

Professors create separate roles for each class (e.g., “biology-101”, “history-202”), assign class-specific agents to each role, and students access via campus SSO with their class enrollment determining which agents they see.

Create a role matching your partner organization’s IdP attribute, assign relevant agents (product documentation, support tools, collaboration assistants), and partners access through their existing corporate login.

Yes. Create a contractor role, assign onboarding agents, and contractors authenticate via their employer’s IdP to access training and documentation agents.

Yes, if your customers use a corporate IdP. B2B companies can give their enterprise customers secure access to support agents or product assistants without managing individual accounts.

They’re redirected to their corporate login page, authenticate with their usual credentials, and land directly on the agent (if one) or a portal showing available agents (if multiple).

Each session lasts 24 hours from initial login. After expiration, users simply log in again through the same portal URL.

No. End-users authenticate entirely through their corporate IdP. They never create a CustomGPT account or password.

 No. Since no account is created, conversation history is not retained for end-user users between sessions. Each session starts fresh.

They see a portal page listing all agents their role permits, and can click to enter any of them.

Yes. If they have access to multiple agents, they can return to the portal and select a different agent within the same 24-hour session.

No. end-user sessions are restricted to chat-only access on assigned agents. Any attempt to access dashboard, settings, or other areas redirects them back to the agent portal.

They see an “unauthorized” error page and cannot access any agents.

No. End-users remain completely anonymous — no account is created. Their conversations appear as anonymous in your analytics.

Conversation data is stored like any other chat, but no personal user data is retained — sessions are anonymous.

Access is controlled through your IdP. Remove the user from the relevant group or change their attribute value in your IdP, and they’ll lose access on their next login attempt.

Sessions are tied to IdP authentication. Sharing the portal URL doesn’t grant access — each user must authenticate through the IdP with valid credentials.

All conversations are stored within your CustomGPT project like regular chats, following your existing data retention and security policies.

Yes. end-user sessions appear in your analytics. Conversations are marked as anonymous but you can track session volume and engagement.

No. By design, end-users are anonymous. You can see conversation content but not individual user identities.

Yes. Queries from end-user sessions count toward your Enterprise plan’s query allocation like any other usage.

Either their IdP isn’t sending the expected attribute, or the attribute value doesn’t match any role name exactly. Check your IdP configuration and verify the role name matches precisely.

The matched role likely is not “Chat-Only Role” and doesn’t have “create conversation” permission enabled. Edit the role in Teams → Roles to enable chat permissions.

Verify SSO is properly configured, the IdP attribute name is entered correctly in your SSO settings, and the feature is enabled on your Enterprise plan.

The matched role has no agents assigned, or the assigned agents have been deleted. Check the role configuration in Teams → Roles.

Yes. Set your agent to Private visibility, select “Enabled (IdP)” under Private Agent Deployment in the Security tab, then copy the embed code from Deploy. The same role-based access controls apply – users authenticate via a popup without leaving your page.

A “Sign in to chat” button on the widget. Clicking it opens a popup with their organization’s login page – not a CustomGPT.ai login. After authenticating, the popup closes and the chat interface appears.

No. Since no CustomGPT.ai accounts are created, external users don’t count against your seat limits.

Share your Agents safely and securely
without extra seats

Your identity system is already in place. Your users are already in it. Now connect them to your chosen AI agents.