This feature is only available on the Enterprise tier. Contact sales to learn more about upgrading.
Overview
Single Sign-On (SSO) lets your team log in to your organization using their existing session with an external Identity Provider (IdP), such as Okta or Azure AD, through OpenID Connect (OIDC). This simplifies user authentication, enhances security, and streamlines access management across your organization. Key capabilities:- Multiple email domains per login provider: Configure several email domains for a single identity provider, ideal for organizations with multiple subsidiaries or acquired companies
- Multiple login providers per organization: Set up more than one identity provider (e.g., both Okta and Azure AD) to accommodate different teams or authentication requirements
- Cross-organization domain support: Use the same email domain across different organizations—users are presented with a list of login options to select their organization
Prerequisites
This is what you will need to have in order to enable SSO:- Admin-level access to your organization settings.
- Domain/DNS admin privileges so you can add a DNS TXT record. This TXT record is used by Ona to verify ownership of the domain associated with your organization.
-
Access to an Identity Provider (e.g. Google, Gitlab, Okta, Microsoft Entra ID) that supports OpenID Connect (OIDC).
- You’ll need to create an OIDC application with your Identity Provider and obtain the Client ID, Client Secret, and Issuer URL.
Setting up Single Sign-On
To begin setting up Single Sign-On, navigate to Organization Settings and choose Login and security from the left-hand menu.
- Login providers - Configure connections to your Identity Providers
- Domains - Verify ownership of your email domains
- Domain associations - Link verified domains to login providers
Step 1. Create a login provider
Click on New SSO to configure how Ona will connect with your Identity Provider. Enter a display name for your login provider. This name will appear on the login provider card in your settings and on the login selection screen when users sign in.
- Client ID: The identifier for your OIDC application.
- Client Secret: Secret key for authenticating with the IdP.
- Issuer URL: Endpoint of the OIDC server.
Testing your configuration
Before rolling this out to your team, let’s make sure everything is working properly: Test the OIDC application by clicking Test & Continue- The authentication flow with your Identity Provider should open in a new browser window.
- Please verify the authentication flow works for you before inviting your team to use the SSO login.

Step 2. Add and verify domains
Domains must be verified before they can be used for SSO login. This verification proves ownership of the email domain. Click on New Domain to add a new domain.
Verify your domain
To verify your domain, you’ll need to add a TXT record to your domain’s DNS settings. Copy the name and value for the TXT record from the verification view.
Check the status of your domain
After adding the TXT record, click Verify to check the status of your domain verification. A delay in DNS updates is expected, so no worries!

Please note that your email domain must be verified before the Sign in with SSO option can be used on the Login screen.
Step 3. Associate domains with login providers
Once you have both a login provider and verified domains, you need to associate the domains with the provider. This tells Ona which identity provider should authenticate users from each email domain. Click on your login provider and select from the dropdown to add a domain.
Multiple domains and providers
You can configure multiple verified domains and multiple login providers to support complex organizational structures.

- Subsidiaries and acquisitions: Configure domains for each company (e.g.,
acme.com,acme.co.uk,acquired-company.com) under a single login provider - Different authentication requirements: Set up separate providers for employees (Okta) and contractors (Azure AD)
- Regional teams: Use different identity providers for teams in different regions
Log in with Single Sign-on
Use your email address
Once you’ve finished setting up SSO for your organization, you’ll need to log out before heading back to the Login page.- Click the Continue with SSO button to sign in using your new SSO setup.
- Enter your email address and click Continue. The domain of your email address must match one of the verified domains associated with a login provider.

Selecting your organization or provider
If your email domain is configured in multiple organizations, or if multiple login providers are associated with the same email domain within your organization, you’ll be presented with a selection screen.
Use the invite link
-
Go to
Settings > Members > Invite membersand copy the invite link for your domain. - When you open the invite link while not logged in, you will only see the active login providers.
Managing Single Sign-on Access
Only Organization Admins are allowed to configure, modify, or disable SSO settings. Regular members will not have access to these options.Deactivating login providers
A deactivated login provider cannot be used to join your organization. The existing login sessions are not affected by this setting. If you need to deactivate a login provider:- Go to Settings > Log In and Security.
- Click the toggle switch next to the login provider and confirm the action.

To protect you from losing access to your organization, the one remaining login provider cannot be deactivated.
Problems and solutions
While setting up SSO, some issues may arise due to misconfigurations or external factors. These can include problems with your Identity Provider settings, incorrect credentials, or network issues. To help you navigate these challenges, we’ve included an FAQ section below with solutions to common problems.-
Error: The redirect URI included is not valid.
- Make sure to paste the correct redirect URI into the OIDC application with your Identity Provider, e.g.
https://app.gitpod.io/auth/oidc/callback.
- Make sure to paste the correct redirect URI into the OIDC application with your Identity Provider, e.g.
-
Error: no such host
- Make sure to paste the correct Issuer URL, e.g.
https://dev-16686455.okta.com. You can also verify the URL by appending the OIDC Discovery path/.well-known/openid-configurationand open the resulting URL in your browser, e.g.https://dev-16686455.okta.com/.well-known/openid-configuration
- Make sure to paste the correct Issuer URL, e.g.