Custom SSO
Set up custom Single Sign-On (SSO) authentication for Fireworks AI
Fireworks uses single sign-on (SSO) as the primary mechanism to authenticate with the platform. By default, Fireworks supports Google SSO.
If you have an enterprise account, Fireworks supports bringing your own identity provider using:
- OpenID Connect (OIDC) provider
- SAML 2.0 provider
Coordinate with your Fireworks AI representative to enable the integration.
OpenID Connect (OIDC) provider
Create OIDC client application
Create an OIDC client application in your identity provider, e.g. Okta.
Configure client
Ensure the client is configured for “code authorization” of the “web” type (i.e. with a client_secret).
Set redirect URL
Set the client’s “allowed redirect URL” to the URL provided by Fireworks. It looks like:
https://fireworks-<your-company-name>.auth.us-west-2.amazoncognito.com/oauth2/idpresponse
Note down client details
Note down the issuer
, client_id
, and client_secret
for the newly created client. You will need to provide this to your Fireworks.ai representative to complete your account set up.
SAML 2.0 provider
Create SAML 2.0 application
Create a SAML 2.0 application in your identity provider, e.g. Okta.
Set SSO URL
Set the SSO URL to the URL provided by Fireworks. It looks like:
https://fireworks-<your-company-name>.auth.us-west-2.amazoncognito.com/saml2/idpresponse
Configure Audience URI
Configure the Audience URI (SP Entity ID) as provided by Fireworks. It looks like:
urn:amazon:cognito:sp:<some-unique-identifier>
Create Attribute Statement
Create an Attribute Statement with the name:
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
and the value user.email
Keep default settings
Leave the rest of the settings as defaults.
Note down metadata URL
Note down the “metadata url” for your newly created application. You will need to provide this to your Fireworks AI representative to complete your account set up.
Was this page helpful?