Skip to main content
Single Sign-On lets your team authenticate to CloudThinker using your existing identity provider — no separate passwords, automatic user provisioning, and centralized deprovisioning when someone leaves.
SSO is available on Business and Enterprise plans. To get started, navigate to Organization Settings → Security → SSO and click Add Connection.

How the Setup Wizard Works

The SSO wizard has three steps: Protocol → SP Metadata → IdP Configuration.
  1. Protocol — Choose SAML 2.0 or OIDC
  2. SP Metadata — Copy CloudThinker’s values into your IdP when creating the SAML app
  3. IdP Configuration — Paste your IdP’s values back into CloudThinker
Use the tabs below to follow the exact steps for your identity provider.

SAML Setup

Google Workspace — SAML Setup

1

Open the Google Admin Console

Go to admin.google.comApps → Web and mobile apps → Add app → Add custom SAML app.
2

Name the App

Give it a name like CloudThinker and click Continue.
3

Download IdP Metadata

On the Google IdP information screen, download the IdP metadata XML or note:
  • SSO URL (Single Sign-On URL)
  • Entity ID (https://accounts.google.com/o/saml2?idpid=...)
  • Certificate (download the X.509 certificate)
Click Continue.
4

Enter CloudThinker SP Details

Copy the values from CloudThinker → Settings → Security → SSO → SP Metadata:
Google FieldCloudThinker Value
ACS URLPaste the ACS URL from CloudThinker
Entity IDPaste the SP Entity ID from CloudThinker
Name ID formatEMAIL
Name IDBasic Information > Primary email
Click Continue.
5

Configure Attribute Mapping

Add the following attribute mappings:
Google Directory AttributeApp Attribute
Primary emailemail
First namefirstName
Last namelastName
Click Finish.
6

Enable the App

In the app settings, set access to On for everyone (or target specific organizational units).
7

Complete Setup in CloudThinker

Back in CloudThinker’s SSO wizard, paste in:
  • Entity ID from Google
  • SSO URL from Google
  • Certificate (paste the X.509 certificate content)
Click Create Connection and then Test to verify.
Use the Import field in CloudThinker to paste your Google IdP metadata URL — this auto-fills Entity ID, SSO URL, and Certificate in one step.

OIDC Setup

Google Workspace — OIDC Setup

1

Create an OAuth Client

Go to console.cloud.google.comAPIs & Services → Credentials → Create Credentials → OAuth 2.0 Client ID.Application type: Web application.
2

Add Authorized Redirect URI

Add the Redirect URI from CloudThinker’s OIDC SP Metadata. Click Create.
3

Copy Credentials

Copy the Client ID and Client Secret.
4

Complete Setup in CloudThinker

In CloudThinker’s OIDC configuration:
  • Discovery URL: https://accounts.google.com/.well-known/openid-configuration
  • Client ID: paste from Google
  • Client Secret: paste from Google
Click Create Connection and Test.

After Setup

Test the Connection

Always test before enforcing SSO:
  1. Click Test in the SSO connection settings
  2. A new browser tab opens and attempts authentication
  3. Confirm you are redirected back to CloudThinker successfully
  4. Check that your user attributes (name, email) were received correctly

Enforce SSO (Optional)

Once verified, you can require all users to authenticate via SSO:
  1. Go to Organization Settings → Security → SSO
  2. Toggle Enforce SSO on
  3. Users will be redirected to your IdP on next login — email/password login is disabled
Make sure at least one Owner account works with SSO before enforcing it. If SSO breaks after enforcement, an Owner with a backup access method can disable it.

User Provisioning

CloudThinker auto-provisions users on first SSO login using the email, firstName, and lastName attributes from your IdP. New users are assigned the Developer role by default — you can change this in SSO settings.

Troubleshooting

Double-check that the ACS URL you entered in your IdP exactly matches what CloudThinker shows — including protocol (https://) and no trailing slash.
Confirm your IdP is sending firstName and lastName attributes. See the attribute mapping table for your provider above.
Make sure you copied the full X.509 certificate including the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- headers. If your IdP rotated its certificate, update it in CloudThinker’s SSO settings.
An Owner can disable SSO enforcement at Organization Settings → Security → SSO using their backup credentials. Check the IdP app is assigned to all affected users.
The SP Entity ID in your IdP must exactly match the SP Entity ID shown in CloudThinker’s SP Metadata — they are case-sensitive.

What’s Next

MFA Setup

Add TOTP-based MFA for an extra layer of authentication

Role-Based Access Control

Configure granular permissions for your team members

Organization Settings

Manage members, workspaces, and organization-level configuration

BYOK

Use your own AWS Bedrock credentials for data residency and cost control