To set up SSO for your team, confirm you have admin access, choose SAML or OIDC, and configure an app in your identity provider with the ACS URL and Entity ID. Connect it to your workspace, then test with a small pilot group before enforcing SSO for everyone.
Scope:
Last updated: December 2025. Applies globally; align SSO and identity data handling with local privacy laws like GDPR and CCPA/CPRA, plus any additional regional data protection rules.
Prerequisites before you set up SSO
Before touching any settings, get these basics in place:- Confirm admin roles in your IdP: In systems like Microsoft Entra ID (Azure AD), you typically need a Cloud Application Administrator, Application Administrator, or similar role to configure SSO for enterprise apps.
- Confirm admin access in the application: You’ll need owner/admin rights wherever you’re enabling SSO (for example, your workspace or org-level security settings) so you can turn on SSO and adjust login policies.
- Decide which protocol you’ll use: Most modern apps support SAML 2.0 and/or OpenID Connect (OIDC) on top of OAuth 2.0; these are recommended over legacy password-based or “linked” SSO flows.
- Clarify security and compliance requirements: Consider things like identity assurance, MFA, audit requirements, and federation patterns, in line with digital identity guidance such as NIST SP 800-63-4.
- Scope your first rollout: Decide which apps and which user groups (e.g., IT + one department) will be part of phase one, and who will remain on local accounts temporarily.
- Plan a rollback path: Keep at least one break-glass admin who can still sign in without SSO until you’re confident the rollout is stable.
High-level steps to configure SSO with any IdP
Most identity providers follow the same pattern when you configure SAML or OIDC SSO.- Create or choose an enterprise app in your IdP: In Entra ID you add an enterprise application; in Google Workspace you add a custom SAML app; in Okta you create an SSO app integration.
- Get IdP metadata for the app: Your IdP will provide either a metadata file or values like SSO URL, Entity ID/issuer, and certificate; you’ll copy these into your application’s SSO settings.
- Configure basic SAML/OIDC settings in the IdP: Add the Assertion Consumer Service (ACS) / redirect URL, the audience/Entity ID, and any sign-on URL that your app requires.
- Map attributes/claims: At minimum, send user email and name; many setups also pass group or role information for authorization decisions. Apps like CustomGPT.ai explicitly require email and first name attributes in setups such as Google Workspace and Okta.
- Assign users and groups: In the IdP, assign the right users or security groups to the new SSO app. Only assigned users will be able to sign in via SSO in integrations like Entra enterprise apps or Okta.
- Exchange metadata with the application: Paste the IdP SSO URL / metadata into your app’s SSO page and, if required, copy back any SP metadata (ACS URL and Entity ID) into the IdP.
- Save and run a basic sign-in test: Most IdPs provide test buttons or preview sign-in flows; use them before rolling the app out to all users.
How to do it with CustomGPT.ai
This section walks through enabling SSO for your team specifically in CustomGPT.ai.Step 1 – Open SSO settings in CustomGPT.ai
- Sign in to app.customgpt.ai.
- Click your profile icon in the bottom-left and choose My Profile.
- Open the Single Sign On (SSO) tab at the top.
Step 2 – Add and verify your domain
- Under Add Your Domain, enter the email domain your team uses (for example, company.com).
- Follow the on-screen instructions to add the provided TXT record to your DNS.
- Wait for the status to change to Verified—typically 15–20 minutes, but it can take up to 72 hours. If it’s still not verified after 72 hours, contact CustomGPT.ai support.
Step 3 – Get ACS URL and Entity ID
- Still on the SSO page, copy the ACS URL and Entity ID values. You’ll need these for your IdP configuration (Google Workspace, Azure, Okta, PingOne).
Step 4 – Configure your identity provider for CustomGPT.ai
Use the CustomGPT.ai IdP-specific guides so your settings match exactly:- Google Workspace (SAML): Create a custom SAML app, download IdP metadata, upload it to CustomGPT.ai, then paste the ACS URL and Entity ID from CustomGPT.ai back into Google. Map Primary email → email and First name → firstName.
- Microsoft Azure / Entra (SAML): Create a non-gallery enterprise application, assign users/groups, configure Single sign-on → SAML, and set the Identifier and Reply URL to the Entity ID and ACS URL from CustomGPT.ai, using the SSO setup guide.
- Okta (SAML + SCIM): In Okta, create a SAML 2.0 app, enter ACS and Entity ID values from CustomGPT.ai, and configure attributes for email and first name. Copy the Okta metadata URL into the Load SAML2 configuration field in CustomGPT.ai.
- PingOne (SAML + SCIM): In PingOne, create a SAML application, import SAML settings from CustomGPT.ai using the Entity ID/ACS URL, set attribute mappings (e.g., email, userName), then copy the IdP metadata URL back into CustomGPT.ai.
Step 5 – Import IdP SAML configuration into CustomGPT.ai
- On the CustomGPT.ai SSO page, provide your IdP’s SAML details by either:
- Import via URL (e.g., Okta or PingOne metadata URL),
- Import via XML, or
- Entering the details manually, such as SSO URL and certificate.
Step 6 – Configure login policy, roles, SCIM, and email deletion
- After SAML is working, customize how SSO behaves for your team:
- Email authentication options: Choose between allowing sign-in only via SSO or allowing both SSO and email/password.
- User role configuration: Set default roles for new users, based on your team’s role configuration, so SSO-created users get the correct permissions automatically.
- SCIM integration: Enable SCIM if you want your IdP to create, update, and deactivate users automatically. The Okta and PingOne guides include the SCIM endpoint and token details.
- Email deletion handling: Choose whether deleting a user also deletes their projects or transfers them to your account (which may affect storage credits).
- Save your settings, perform a test login via your IdP, and confirm the user lands in CustomGPT.ai with the correct role.
Test and roll out SSO to your team
Once SSO is wired up, treat rollout like a mini-project.- Test in a non-production or low-risk context first: Microsoft recommends testing SSO in a non-production environment or with limited scope before broad deployment.
- Test with multiple user types: Use at least one admin and one standard user from different groups. Verify they can sign in, sign out, and access appropriate resources.
- Verify attributes and provisioning: Confirm that email, name, and group/role claims are correct and that SCIM (if enabled) is creating and deactivating users as expected in CustomGPT.ai.
- Pilot with a small group: Start with a pilot team (for example, IT + one department). Make sure they understand the new login flow and where to go if sign-in fails. Planning guides from Microsoft emphasize this phased approach.
- Gradually expand and then enforce: As confidence grows, assign more groups in the IdP and eventually switch CustomGPT.ai to “SSO-only” sign-ins if that matches your policy. Keep at least one emergency account with local login until you’re comfortable.
- Monitor logs and security signals: Use your IdP’s sign-in logs and Conditional Access policies to watch for anomalies, lockouts, or misconfigured devices.
Example — SSO rollout for a 50-person SaaS team
Imagine a 50-person SaaS company using Microsoft Entra ID as its IdP and adopting CustomGPT.ai for internal and customer-facing AI agents.- Plan and scope: The IT admin reviews Entra’s SSO options and deployment planning guidance, decides to use SAML, and targets 10 internal users as a pilot group.
- Configure Entra SSO: They create a non-gallery enterprise application, enable SAML-based SSO, and configure Reply URL and Identifier using the ACS URL and Entity ID from CustomGPT.ai’s SSO page.
- Complete CustomGPT.ai SSO setup: The admin imports the Entra metadata into CustomGPT.ai, verifies sign-in for a single test user, then configures SSO to allow both SSO and email/password during the pilot. Default user roles are set so new SSO users join as “Members,” not owners.
- Pilot phase: A 10-person pilot team is assigned to the Entra enterprise app. The IT admin checks that their conversations and projects are behaving as expected and that SCIM is correctly provisioning new hires from Entra into CustomGPT.ai.
- Full rollout and enforcement: After two weeks with no issues, the admin assigns the remaining 40 users in Entra and switches CustomGPT.ai to “SSO-only” login. One emergency local admin account is kept in reserve in case of IdP outages.