Any identity provider.
Zero friction.
SAML 2.0, OIDC, LDAP/AD — configured from your dashboard in minutes. Domain routing auto-detects the right IdP. JIT provisioning creates users on first login. Per-org SSO for B2B.
SSO shouldn't block enterprise deals
Without AuthFI
- ✗ "We need SSO" — 3 months of engineering
- ✗ Build SAML SP from scratch, debug XML signatures
- ✗ Another customer needs OIDC — rebuild everything
- ✗ LDAP customer appears — hire a contractor
- ✗ Auth0 SSO add-on: $150+/connection/month
With AuthFI
- ✓ "We need SSO" — configured in 10 minutes
- ✓ SAML, OIDC, LDAP — all supported, same dashboard
- ✓ Upload metadata, map attributes, test, done
- ✓ JIT provisioning creates users on first login
- ✓ SSO connections included in Pro plan ($149/mo)
Three protocols. Every IdP covered.
SAML 2.0 for enterprise, OIDC for modern identity, LDAP for on-prem. Each configured from the same dashboard.
SAML 2.0
The enterprise standard. Upload IdP metadata XML, AuthFI handles assertion parsing, signature validation, and attribute mapping.
- 1 Upload IdP metadata XML (or URL)
- 2 Map attributes: email, name, groups
- 3 Configure domain routing
- 4 Test with IdP-initiated or SP-initiated flow
OIDC
Modern OpenID Connect. Provide a discovery URL and client credentials. AuthFI handles the authorization code flow with PKCE.
- 1 Enter discovery URL (.well-known/openid-configuration)
- 2 Set client ID and secret
- 3 Map claims to AuthFI attributes
- 4 Test login flow
LDAP / Active Directory
On-prem directory integration. Bind to LDAP, search for users, validate credentials. Supports LDAPS for encrypted connections.
- 1 Configure host, port, base DN
- 2 Set bind credentials
- 3 Define user search filter
- 4 Map LDAP attributes to AuthFI fields
Domain routing — automatic IdP detection
User enters their email. AuthFI reads the domain. Redirects to the right identity provider. No dropdown. No confusion. Just type your email.
roles: ["admin"], groups: ["engineering"],
sso_provider: "okta", sso_protocol: "saml" }
// Your app doesn't care which IdP. Same JWT shape always.
Configure SSO in 3 steps
No code changes. No SAML libraries. No XML debugging. Dashboard + test + done.
Upload metadata
Paste IdP metadata XML, or enter an OIDC discovery URL, or configure LDAP connection.
EntityID: https://acme.okta.com/app/xxx
SSO URL: https://acme.okta.com/app/xxx/sso/saml
Cert: ✓ X.509 parsed
OIDC: Enter discovery URL
https://login.microsoftonline.com/xxx/.well-known/openid-configuration
✓ Endpoints auto-discovered
Configure domain routing
Map email domains to this SSO connection. Multiple domains per connection.
acme.com → This SSO connection
acme.io → This SSO connection
acme-corp.com → This SSO connection
Attribute mapping:
email ← NameID
name ← displayName
groups ← memberOf
Test and activate
One-click test login. See the full SAML assertion or OIDC claims. Then activate.
✓ SAML assertion received (valid signature)
✓ User identified: alice@acme.com
✓ Attributes mapped: name, groups
✓ JIT user created in AuthFI
✓ JWT issued with roles + permissions
Connection active. Users from @acme.com will be routed here.
Just-in-time provisioning
First SSO login auto-creates the user. Maps IdP attributes to AuthFI profile. Assigns groups and roles automatically. No admin intervention.
alice@acme.com authenticates with Okta. AuthFI receives the SAML assertion.
AuthFI creates a user record from IdP attributes. Email verified automatically (IdP is the authority).
IdP group "Engineering" maps to AuthFI group "engineering". Group roles and permissions apply immediately.
Full JWT with identity, roles, permissions, groups. User accesses your app with correct permissions from minute one.
Attribute mapping
IdP attributes are mapped to AuthFI fields on every login.
| FROM IdP | TO AUTHFI | EXAMPLE |
|---|---|---|
| NameID / sub | alice@acme.com | |
| displayName | name | Alice Chen |
| memberOf / groups | groups | ["engineering", "devops"] |
| department | metadata | { "dept": "Engineering" } |
| jobTitle | metadata | { "title": "Staff Engineer" } |
Per-org SSO — different IdPs for different customers
For B2B SaaS: each of your customers (organizations) configures their own SSO provider. Your app code doesn't change at all.
Memorial Hospital
City Clinic
Rural Labs
What happens under the hood
The full SSO flow from email input to JWT — no code needed from your side.
SSO + SCIM = complete lifecycle
SSO handles authentication. SCIM handles provisioning. Together, they manage the full user lifecycle — from first login to offboarding.
SSO (authentication)
- ✓ User authenticates against their IdP
- ✓ JIT creates user on first login
- ✓ Profile synced on every login
- ✓ Session managed by AuthFI
SCIM (provisioning)
- ✓ IdP pushes user create/update/delete
- ✓ Users pre-provisioned before first login
- ✓ Deprovisioned users blocked immediately
- ✓ Group membership synced in real-time
Related features
Available on Starter and above. See pricing →
One platform. Every identity layer.
Free to start.
Free for 5,000 users. Upgrade when you're ready.
Start building free →