- OIDC (OpenID Connect)
- SAML 2.0 (Security Assertion Markup Language)
Table of Contents
OIDC Integration
For OIDC integration, we require the following information from your identity provider:Required Information
- Issuer URL: The URL of your identity provider’s OIDC authorization endpoint. Wellknown OIDC configuration should be available at this URL.
- Client ID: The client ID provided by your identity provider.
- Client Secret Key: The client secret provided by your identity provider.
Setup Steps
Following scopes are required for Portkey to work with OIDC:
- openid
- profile
- offline_access
General
- Create an OIDC application in your identity provider.
- Once the application is created, please note the following details:
Issuer URLClient IdClient Secret
- Update the above details in Portkey Control Plane in
Admin Settings > Authentication Settings > OIDC.
Okta
- Go to
Applicationstab on Okta dashboard andcreate a new app integration. - Select
OIDC - OpenID Connectas the signin method. - Select Application Type as
WebApplication - On the next step, fill in the required fields. The
signin redirect URIshould be https://app.portkey.ai/v2/auth/callback and theGrant Typeshould haveAuthorization codeandRefresh Tokenas checked - Create Application
- After the application is created, go to the
Generalsection of the application. - Click on the
editbutton for the General Settings section. - Select
Either Okta or appfor theLogin initiated byfield. - Add https://app.portkey.ai/v2/auth/callback as the
initiate login URI - Go to the
Sign Onsection and click onEdit. SelectOkta Urlas theissuerand save the updated details - Once everything is setup please note the following details
Issuer URLwill be theIssuerfrom above stepClient Idwould be same asAudience/Client IDClient Secretis needed for Web App based flow. It can be found underGeneral > Client Credentials > Client Secretsin your Okta App.
- Update the above details in Portkey Control Plane in
Admin Settings > Authentication Settings > OIDC
Azure AD
- Sign in to the Azure portal.
- Search for and select Azure Active Directory.
- Under Manage, select App registrations.
- Select New registration.
- Enter a name.
- Select one of the Supported account types that best reflects your organization requirements.
- Under
Redirect URI,- Select
Webas the platform - Enter https://app.portkey.ai/v2/auth/callback as redirect url
- Select
- Click on Register
- Once saved, go to
Certificates & secrets- Click on
Client Secrets - Click on
New client secret - Use appropriate settings according to your organisation
- Click on
Add
- Click on
- Once everything is set up. Please go to
Overview- Click on
Endpointsand note theOpenID Connect metadata documenturl - Please note the
Application (client) IDfromEssentials - Please note the
Client SecretfromCertificates & secrets
- Click on
- Update the above details in Portkey Control Plane in
Admin Settings > Authentication Settings > OIDC
SAML Integration
For SAML integration, we require the following information from your identity provider:Required Information
Either of the following information is required:- Provider Metadata URL: The URL from your identity provider containing the metadata, including SAML configuration details.
- Provider Metadata XML: The XML metadata of your identity provider.
Setup Steps
General
- Create an SAML application in your identity provider.
- Once the application is created, please note the following details:
Provider Metadata URLProvider Metadata XML
- Update the above details in Portkey Control Plane in
Admin Settings > Authentication Settings > SAML.
Okta
- Go to
Applicationstab on okta dashboard andcreate a new app integration. - Select
SAML 2.0as the signin method. - In
Configure SAML, updateSingle sign-on URLwith Saml redirect url. You can find the Saml redirect url from theAdmin Settings > Authentication Settings > SAML Redirect/Consumer Service URLfrom Portkey Control Plane.Audience URI (SP Entity ID)with SAML Entity ID from Portkey Control Plane.
- Create Application
- Once everything is set up, please note the following details
Sign On tab > SAML 2.0 tab > Metadata details > Metadata URL
- Update the above details in Portkey Control Plane in
Admin Settings > Authentication Settings > SAML
Azure AD
- Sign in to the Azure portal.
- Search for and select Azure Active Directory.
- Under Manage, select App registrations.
- Select New registration.
- Enter a name.
- Select one of the Supported account types that best reflects your organization requirements.
- Under
Redirect URI,- Select
Webas the platform - Enter the
SAML Redirect/Consumer Service URLfrom Portkey Control Plane as redirect url
- Select
- Select
Register. - Select
Endpointsat the top of the page. - Find the
Federation metadata document URLand select the copy icon. - In the left side panel, select
Expose an API. - To the right of
Application ID URI, selectAdd.- Enter
SAML Entity IDfrom Portkey Control Plane as theApp ID URI.
- Enter
- Select
Save. - Once everything is set up, please note the following details
- Copy the
Federation metadata document URLand paste it in Portkey Control Plane inAdmin Settings > Authentication Settings > SAML > Provider Metadata URL
- Copy the

