- OpenID Connect (OIDC) provider
- SAML 2.0 provider
Coordinate with your Fireworks AI representative to enable the integration.
OpenID Connect (OIDC) provider
Create OIDC client application
Create an OIDC client application in your identity provider, e.g. Okta.
Configure client
Ensure the client is configured for “code authorization” of the “web” type (i.e. with a client_secret).
Set redirect URL
Set the client’s “allowed redirect URL” to the URL provided by Fireworks. It looks like:
SAML 2.0 provider
Create SAML 2.0 application
Create a SAML 2.0 application in your identity provider, e.g. Okta.
Configure Audience URI
Configure the Audience URI (SP Entity ID) as provided by Fireworks. It looks like:
Just-In-Time (JIT) user provisioning
JIT user provisioning automatically creates user accounts when they sign in through SSO for the first time. When enabled, users who authenticate through your identity provider are automatically added to your Fireworks account without requiring manual user creation. To enable JIT user provisioning, use the--enable-jit-user-provisioning flag when creating your identity provider with firectl.
Enforce SSO
When SSO enforcement is enabled, account access is restricted to users with approved tenant domains only. Users with matching domains must authenticate via the identity provider, and users with other domains are blocked. To enforce SSO, use the--enforce-sso flag when creating your identity provider with firectl, or toggle “Enforce SSO for all users” in the Fireworks console.