SSO is a Business and Enterprise feature. It is not available on Starter or Professional plans. See Subscription Tiers for details or contact sales to upgrade.
Overview
Cost Optix supports Single Sign-On via OpenID Connect (OIDC). Once configured, users with your organisation’s email domain are automatically routed to your identity provider when they click Continue with SSO on the login page. SSO is configured entirely from within the dashboard — no support ticket required.
Compatible identity providers include Okta, Auth0, Google Workspace, Microsoft Entra ID (Azure AD), Keycloak, and any OIDC-compliant IdP.
Configuring SSO
Go to Settings → Single Sign-On.
1. Set your email domain
Enter your organisation’s email domain (e.g. acme.com). Users entering an email address with this domain on the login page will be redirected to your IdP automatically.
2. Enter your Issuer URL
Paste the base URL of your identity provider, then click Auto-discover. Cost Optix fetches the OIDC discovery document at <issuer>/.well-known/openid-configuration and populates the authorization, token, userinfo, and JWKS endpoints automatically.
Common issuer URLs:
| Provider | Issuer URL |
|---|
| Okta | https://your-org.okta.com |
| Auth0 | https://your-tenant.auth0.com |
| Google Workspace | https://accounts.google.com |
| Microsoft Entra ID | https://login.microsoftonline.com/<tenant-id>/v2.0 |
| Keycloak | https://your-keycloak.example.com/realms/your-realm |
3. Register Cost Optix in your IdP
In your identity provider, create a new OIDC application. Set the Redirect URI to:
https://costoptix.com/api/v1/auth/sso/callback
Copy the Client ID and Client Secret from your IdP and paste them into the form.
The default scopes are openid email profile — sufficient for user identification and account creation. You can add custom scopes if needed.
Just-in-time (JIT) provisioning automatically creates a Cost Optix user the first time someone authenticates via SSO, without requiring a prior invitation. Enabled by default. New users are assigned the Default role you set (member or admin).
5. Test and enable
Click Save, then Test connection. Cost Optix re-runs OIDC discovery and verifies the endpoints are reachable. Once the test passes, toggle Enable SSO to activate it.
SSO must pass a successful connection test before it can be enabled. This prevents lockouts from misconfigured credentials.
How Login Routing Works
When a user enters their email on the login page and clicks Continue with SSO, Cost Optix:
- Extracts the email domain
- Looks up the SSO config registered for that domain
- Redirects the browser to your IdP’s authorisation endpoint
- Receives the authorisation code at the callback URL
- Exchanges the code for tokens, validates them, and creates or updates the user account
Users can also be directed to SSO via a direct link: https://costoptix.com/login?org=<orgID>
Supported Identity Providers
| Provider | Protocol |
|---|
| Okta | OIDC |
| Microsoft Entra ID (Azure AD) | OIDC |
| Google Workspace | OIDC |
| Auth0 | OIDC |
| Keycloak | OIDC |
| Any OIDC-compliant IdP | OIDC |
Attribute Mapping
By default, Cost Optix maps these OIDC claims to user attributes:
| OIDC claim | Cost Optix field |
|---|
email | Email address |
given_name | First name |
family_name | Last name |
Revoking Access
Remove the user from the relevant group or application in your IdP — their Cost Optix session is invalidated at next login. You can also immediately deactivate users from Admin → Users at any time.
To disable SSO without deleting the configuration, use the Enable / Disable toggle. To remove the configuration entirely, click Delete configuration.