SSO with SAML
OX Security supports Single Sign-On (SSO) for secure authentication and centralized access control. The connection allows users to sign in to OX Security with their corporate credentials managed by an Identity Provider (IdP).
OX Security supports:
Auto-provisioning: Automatically creates user accounts at first login.
App-initiated login: Starts login directly from the OX sign-in page.
Group-based roles and scopes: Assigns OX permissions based on IdP groups.
When auto-provisioning is ON:
OX automatically creates a user account when someone signs in through the IdP.
Account details (name, email, groups) come directly from the IdP.
You do not need to invite users manually.
When auto-provisioning is OFF:
OX does not create accounts automatically.
You must invite users manually before they can access OX.
Prerequisites
OX and IdP admin permissions
A decision on enabling optional features:
App-initiated login
Auto-provisioning for roles
Auto-provisioning for scopes
Access to your IdP’s SAML metadata and X.509 certificate
Process steps
Step 1: Get OX Inputs for your IdP [OX]
The inputs are specific for your IdP and organization.
To get the correct values from OX, go to Settings > Login and click the IdP icon. The Configuration screen opens.

Click SAML SSO SETUP INSTRUCTIONS.
Locate the parameters, copy the values, and save them for use in Step 3.
Single Sign-On URL (ACS)
Audience URI (SP Entity ID)
Initiate login URI
Step 2: Register the application [IdP]
Log in to your IdP Admin console.
Go to Applications > Create App Integration (or equivalent).
Select SAML 2.0 as the sign-in method.
Enter an App integration name e.g., OX Security SSO.
Save the changes.
Step 3: Configure the IdP settings [IdP]
In your IdP, open the SAML setup or metadata page.
Paste the OX values that you saved in Step 1 into your IdP's configuration:
Single Sign-On URL (ACS)
Audience URI (SP Entity ID)
Initiate login URI
Set the attributes for: name, email, email_verified.
Collect and save the following IdP details to paste into OX.
Company domain: Your IdP domain name.
Identity provider Single Sign-On URL: the IdP SSO endpoint.
X.509 certificate: Download and convert to Base64 and save the file.
Step 4: Configure SSO [OX]
In OX, go to Settings > Login and click the relevant IdP icon. The Configuration screen opens.

Enter the details collected from your IdP in Step 3.
Company domain
Sign-In URL (Identity Provider Single Sign-On URL)
X.509 certificate (Base64)
Click Save.
Optional Step 5: Enable IdP app-initiated login and visibility [OX-IdP]
This step allows users to start their login directly from your IdP dashboard.
In your IdP, open General settings for the OX SAML app.
Add the Initiate login URI you saved in Step 1.
Click Save.
Optional Step 6: Configure auto-provisioning for roles [OX-IdP]
This step enables the automatic assignment of OX Security roles based on user groups in your IdP.
Each role group requires a prefix. The default is: XApp-. To change the prefix in OX, go to Settings > Login > [IdP icon] and enter a different prefix.

Create IdP role groups: In your IdP, go to Directory > Groups and create groups using these exact names (case-sensitive) for each OX role you want to sync:
OXApp-Admin
OXApp-Developer
OXApp-Dev Manager/Security Champion
OXApp-Policy Manager
OXApp-Read Only
Map group attributes: In your IdP, ensure you have groups attribute mapping enabled.
Enable sync: In OX, go to Settings > Login > [IdP icon] and enable Sync OX Group Roles using the prefix you selected.

Click Save.
In the IdP, assign users who need that specific scope access as members of the corresponding group.
Optional Step 7: Configure Auto-Provisioning for Scopes [OX-IdP]
This step enables the automatic assignment of granular access scopes based on user groups in your IdP. There is no prefix required for Scopes in OX; however, you do need to create a Scopes group and assign an owner.
In OX, go to the Applications page, and select an app from the list. From the header, click the Assign Owner icon.

In the Assign Application Owners screen:
Select a role.
App New Owner: Enter a descriptive name.
Email: Enter an email. The email can be a functional address.

Click + ADD. This generates the SSO Group String. Save this string to paste into the IdP.

Create scope groups in the IdP: In your IdP, go to Directory > Groups and create scope groups using these specific formats. - App Owner Scope:
OXAppOwnerScope-<SCOPE_NAME>-id:<APP_OWNER_ID>Example: OXAppOwnerScope-DevOps-id:[email protected] - Tag Scope:OXTagScope-<TAG_NAME>-id:<TAG_ID>Example: OXTagScope-app-id:acme-appAssign members in the IdP: In the IdP, assign members to the relevant scope groups.
Enable sync in OX: In OX, go to Settings > Login > [Idp] and enable the toggle Sync OX Group Scopes. Generally select the Entire Organization.

Click Save.
Step 8: Test the Sign-In [OX]
In OX, log out then log in again using your SSO.
Verify that the configured roles and scopes from your IdP are applied correctly.
Your OX organization is now connected to your IdP. Users can sign in securely with corporate credentials, and applied roles and scopes are based on the IdP configuration.
Troubleshooting
The table lists some possible issues and recommended actions.
User cannot sign in
Incorrect SSO URL or certificate.
Verify the IdP Single Sign-On URL and X.509 certificate match the OX setup.
Account not created
Auto-provisioning disabled.
Enable auto-provisioning in your IdP or invite the user manually.
Role not applied
Group mapping mismatch.
Ensure IdP group names match OX role names exactly.
Scope not applied
Scope group format incorrect.
Confirm group naming matches OXAppOwnerScope- or OXTagScope- format.
Role changes ignored in OX
Roles managed in IdP.
Manage all role assignments within the IdP.
Certificate errors
Expired or malformed X.509.
Re-upload a valid Base64 certificate in OX.
Last updated
