Skip to main content
SSO is a Business and Enterprise feature. It is not available on Starter or Professional plans. See Subscription Tiers for details or contact sales to upgrade.

Overview

Cost Optix supports Single Sign-On via OpenID Connect (OIDC). Once configured, users with your organisation’s email domain are automatically routed to your identity provider when they click Continue with SSO on the login page. SSO is configured entirely from within the dashboard — no support ticket required. Compatible identity providers include Okta, Auth0, Google Workspace, Microsoft Entra ID (Azure AD), Keycloak, and any OIDC-compliant IdP.

Configuring SSO

Go to Settings → Single Sign-On.

1. Set your email domain

Enter your organisation’s email domain (e.g. acme.com). Users entering an email address with this domain on the login page will be redirected to your IdP automatically.

2. Enter your Issuer URL

Paste the base URL of your identity provider, then click Auto-discover. Cost Optix fetches the OIDC discovery document at <issuer>/.well-known/openid-configuration and populates the authorization, token, userinfo, and JWKS endpoints automatically. Common issuer URLs:
ProviderIssuer URL
Oktahttps://your-org.okta.com
Auth0https://your-tenant.auth0.com
Google Workspacehttps://accounts.google.com
Microsoft Entra IDhttps://login.microsoftonline.com/<tenant-id>/v2.0
Keycloakhttps://your-keycloak.example.com/realms/your-realm

3. Register Cost Optix in your IdP

In your identity provider, create a new OIDC application. Set the Redirect URI to:
https://costoptix.com/api/v1/auth/sso/callback
Copy the Client ID and Client Secret from your IdP and paste them into the form.

4. Configure scopes and JIT provisioning

The default scopes are openid email profile — sufficient for user identification and account creation. You can add custom scopes if needed. Just-in-time (JIT) provisioning automatically creates a Cost Optix user the first time someone authenticates via SSO, without requiring a prior invitation. Enabled by default. New users are assigned the Default role you set (member or admin).

5. Test and enable

Click Save, then Test connection. Cost Optix re-runs OIDC discovery and verifies the endpoints are reachable. Once the test passes, toggle Enable SSO to activate it.
SSO must pass a successful connection test before it can be enabled. This prevents lockouts from misconfigured credentials.

How Login Routing Works

When a user enters their email on the login page and clicks Continue with SSO, Cost Optix:
  1. Extracts the email domain
  2. Looks up the SSO config registered for that domain
  3. Redirects the browser to your IdP’s authorisation endpoint
  4. Receives the authorisation code at the callback URL
  5. Exchanges the code for tokens, validates them, and creates or updates the user account
Users can also be directed to SSO via a direct link: https://costoptix.com/login?org=<orgID>

Supported Identity Providers

ProviderProtocol
OktaOIDC
Microsoft Entra ID (Azure AD)OIDC
Google WorkspaceOIDC
Auth0OIDC
KeycloakOIDC
Any OIDC-compliant IdPOIDC

Attribute Mapping

By default, Cost Optix maps these OIDC claims to user attributes:
OIDC claimCost Optix field
emailEmail address
given_nameFirst name
family_nameLast name

Revoking Access

Remove the user from the relevant group or application in your IdP — their Cost Optix session is invalidated at next login. You can also immediately deactivate users from Admin → Users at any time. To disable SSO without deleting the configuration, use the Enable / Disable toggle. To remove the configuration entirely, click Delete configuration.