- OIDC (OpenID Connect)
- SAML 2.0 (Security Assertion Markup Language)
Table of Contents
OIDC Integration
For OIDC integration, we require the following information from your identity provider:Required Information
- Issuer URL: The URL of your identity provider’s OIDC authorization endpoint. Wellknown OIDC configuration should be available at this URL.
- Client ID: The client ID provided by your identity provider.
- Client Secret Key: The client secret provided by your identity provider.
Setup Steps
Following scopes are required for Portkey to work with OIDC:
- openid
- profile
- offline_access
General
- Create an OIDC application in your identity provider.
- Once the application is created, please note the following details:
- Issuer URL
- Client Id
- Client Secret
 
- Update the above details in Portkey Control Plane in Admin Settings > Authentication Settings > OIDC.
Okta
- Go to Applicationstab on Okta dashboard andcreate a new app integration.
- Select OIDC - OpenID Connectas the signin method.
- Select Application Type as WebApplication
- On the next step, fill in the required fields. The signin redirect URIshould be https://app.portkey.ai/v2/auth/callback and theGrant Typeshould haveAuthorization codeandRefresh Tokenas checked
- Create Application
- After the application is created, go to the Generalsection of the application.
- Click on the editbutton for the General Settings section.
- Select Either Okta or appfor theLogin initiated byfield.
- Add https://app.portkey.ai/v2/auth/callback as the initiate login URI
- Go to the Sign Onsection and click onEdit. SelectOkta Urlas theissuerand save the updated details
- Once everything is setup please note the following details
- Issuer URLwill be the- Issuerfrom above step
- Client Idwould be same as- Audience/- Client ID
- Client Secretis needed for Web App based flow. It can be found under- General > Client Credentials > Client Secretsin your Okta App.
 
- Update the above details in Portkey Control Plane in Admin Settings > Authentication Settings > OIDC
Azure AD
- Sign in to the Azure portal.
- Search for and select Azure Active Directory.
- Under Manage, select App registrations.
- Select New registration.
- Enter a name.
- Select one of the Supported account types that best reflects your organization requirements.
- Under Redirect URI,- Select Webas the platform
- Enter https://app.portkey.ai/v2/auth/callback as redirect url
 
- Select 
- Click on Register
- Once saved, go to Certificates & secrets- Click on Client Secrets
- Click on New client secret
- Use appropriate settings according to your organisation
- Click on Add
 
- Click on 
- Once everything is set up. Please go to Overview- Click on Endpointsand note theOpenID Connect metadata documenturl
- Please note the Application (client) IDfromEssentials
- Please note the Client SecretfromCertificates & secrets
 
- Click on 
- Update the above details in Portkey Control Plane in Admin Settings > Authentication Settings > OIDC
SAML Integration
For SAML integration, we require the following information from your identity provider:Required Information
Either of the following information is required:- Provider Metadata URL: The URL from your identity provider containing the metadata, including SAML configuration details.
- Provider Metadata XML: The XML metadata of your identity provider.
Setup Steps
General
- Create an SAML application in your identity provider.
- Once the application is created, please note the following details:
- Provider Metadata URL
- Provider Metadata XML
 
- Update the above details in Portkey Control Plane in Admin Settings > Authentication Settings > SAML.
Okta
- Go to Applicationstab on okta dashboard andcreate a new app integration.
- Select SAML 2.0as the signin method.
- In Configure SAML, update- Single sign-on URLwith Saml redirect url. You can find the Saml redirect url from the- Admin Settings > Authentication Settings > SAML Redirect/Consumer Service URLfrom Portkey Control Plane.
- Audience URI (SP Entity ID)with SAML Entity ID from Portkey Control Plane.
 
- Create Application
- Once everything is set up, please note the following details
- Sign On tab > SAML 2.0 tab > Metadata details > Metadata URL
 
- Update the above details in Portkey Control Plane in Admin Settings > Authentication Settings > SAML
Azure AD
- Sign in to the Azure portal.
- Search for and select Azure Active Directory.
- Under Manage, select App registrations.
- Select New registration.
- Enter a name.
- Select one of the Supported account types that best reflects your organization requirements.
- Under Redirect URI,- Select Webas the platform
- Enter the SAML Redirect/Consumer Service URLfrom Portkey Control Plane as redirect url
 
- Select 
- Select Register.
- Select Endpointsat the top of the page.
- Find the Federation metadata document URLand select the copy icon.
- In the left side panel, select Expose an API.
- To the right of Application ID URI, selectAdd.- Enter SAML Entity IDfrom Portkey Control Plane as theApp ID URI.
 
- Enter 
- Select Save.
- Once everything is set up, please note the following details
- Copy the Federation metadata document URLand paste it in Portkey Control Plane inAdmin Settings > Authentication Settings > SAML > Provider Metadata URL
 
- Copy the 

