SSO lets your team sign into TrueGrade using your organization’s existing identity provider. Available on Enterprise plans.
| Provider | Protocol |
|---|---|
| Microsoft Entra ID (Azure AD) | OIDC / SAML 2.0 |
| Google Workspace | OIDC |
| Okta | OIDC / SAML 2.0 |
| OneLogin | SAML 2.0 |
| Generic OIDC | OIDC |
| Generic SAML | SAML 2.0 |
In the Azure portal, navigate to Azure Active Directory → App Registrations → New Registration:
TrueGradehttps://app.truegrade.build/auth/callback/entraFrom the app registration overview, copy:
Create a client secret under Certificates & Secrets → New client secret. Copy the value immediately — it is not shown again.
Navigate to Administration → Integrations → Single Sign-On → Microsoft Entra ID. Enter:
Click Test Connection before saving.
In Azure, navigate to Enterprise Applications → TrueGrade → Users and Groups and assign the users or groups that should have access.
Once SSO is configured and tested, you can require all users to authenticate via SSO:
Navigate to Administration → Organization Settings → Security → SSO Enforcement → Enable.
When enabled:
Test SSO thoroughly with a non-admin account before enabling enforcement. If SSO misconfiguration locks out all users, contact support@truegrade.build for emergency access recovery.
When SSO is active, users who authenticate for the first time via SSO are automatically provisioned in TrueGrade with the Viewer role. An Admin or Owner must promote them to an appropriate role before they can access project data.
To disable JIT provisioning and require manual user creation before first login, toggle Require manual provisioning in the SSO configuration.