Prerequisites
- You must be an organization admin.
- SSO access must be enabled for your organization. If you don’t have access, request it from the SSO settings page in the dashboard.
Setup
Configure your SSO provider
Navigate to Organization Settings > SSO and click Configure SSO Connection.Tensorlake supports two protocols:
Attribute mapping: Ensure your IdP sends at minimum the user’s email address. Name attributes (first name, last name) are recommended for a complete profile.
- OIDC (OpenID Connect) — recommended for providers like Google Workspace, Okta, and Auth0.
- SAML 2.0 — supported for providers like Azure AD (Entra ID), OneLogin, and other SAML-compatible IdPs.
| Field | Description |
|---|---|
| Domain | Your organization’s email domain (e.g. yourcompany.com). Users with this domain will be directed to your IdP. |
| Issuer URL | The issuer or entity ID from your IdP. |
| Client ID | The application/client ID assigned by your IdP. |
| Client Secret | The client secret from your IdP (OIDC only). |
| Authorization Endpoint | The URL where users are sent to authenticate (OIDC). |
| Token Endpoint | The URL used to exchange authorization codes for tokens (OIDC). |
| ACS URL / SSO URL | The Assertion Consumer Service URL (SAML). Provided by Tensorlake. |
| Certificate | The X.509 signing certificate from your IdP (SAML). |
Test the SSO connection
After saving your configuration, test the connection by performing a test login.
- Click Test Connection in the SSO settings.
- You will be redirected to your IdP to authenticate.
- After successful authentication, you are redirected back to Tensorlake and the provider is marked as Verified.
Enforce SSO (optional)
SSO enforcement requires all organization members to sign in through your IdP. When enabled, password-based login is disabled for all members — the only way to sign in is through the IdP.To enable enforcement:
- Designate at least one organization admin as a bypass user. This is required before enforcement can be enabled.
- Toggle Enforce SSO in the SSO settings.
Only organization admins can enable or disable SSO enforcement and manage bypass users.
How SSO login works
When SSO is configured for your organization, the login flow works as follows:- A user enters their email on the Tensorlake login page.
- Tensorlake checks whether the email domain has an SSO provider configured.
- If SSO is configured and enforced, the user is redirected to the IdP with an
SSO_REQUIREDresponse. Password-based login is not available. - If SSO is configured but not enforced, the user can choose to sign in with SSO or with their Tensorlake password.
- After authenticating with the IdP, the user is redirected back to Tensorlake and signed in.
Frequently Asked Questions
Which identity providers are supported?
Which identity providers are supported?
Tensorlake supports any IdP that implements OIDC or SAML 2.0. Common providers include Okta, Azure AD (Entra ID), Google Workspace, OneLogin, and Auth0.
Can I configure multiple SSO providers?
Can I configure multiple SSO providers?
Each organization supports one SSO provider at a time. If you need to switch providers, update the existing SSO configuration with the new provider’s details.
What happens when I enforce SSO?
What happens when I enforce SSO?
All members must authenticate through your IdP. Password-based login is disabled for the entire organization, except for designated bypass users.
Who can be a bypass user?
Who can be a bypass user?
Only organization admins can be designated as bypass users. At least one bypass user is required before SSO enforcement can be enabled. Bypass users retain password-based login solely for emergency recovery, such as disabling enforcement if your IdP becomes unavailable.
How does SSO enforcement affect API keys?
How does SSO enforcement affect API keys?
API keys are not affected by SSO enforcement. Existing API keys continue to work regardless of SSO settings. API keys authenticate directly with the Tensorlake API and do not go through the IdP login flow.
What happens if my IdP goes down while SSO is enforced?
What happens if my IdP goes down while SSO is enforced?
If your IdP is unavailable, members will not be able to sign in. A bypass user (org admin with password-based login retained) can sign in and disable enforcement until the IdP is restored.
Can I test SSO without affecting existing users?
Can I test SSO without affecting existing users?
Yes. SSO is not enforced until you explicitly enable enforcement. During setup and testing, all users can continue to sign in with their existing credentials.
Do users need to be re-invited after enabling SSO?
Do users need to be re-invited after enabling SSO?
No. Existing organization members continue to have access. They will simply be redirected to the IdP on their next login if enforcement is enabled.