Prerequisites
- Organization owner role — You must be an owner of the organization to configure SSO settings.
- Identity provider administrative access — You need admin access to create and configure an OIDC application in your identity provider.
- Required claims — Your identity provider must return
email,given_name, andfamily_nameclaims. - User assignment — Users must be assigned to the application in your identity provider.
- DNS administrative access — You need admin access to your domain’s DNS settings for domain verification.
Configure OIDC Connection
The Maverics Console supports an OIDC connection with any identity provider that returns the required claims (email, given_name, family_name).
Enable SSO for your organization
Click your profile in the upper-right corner of the Console, then click Organizations. Select the organization you want to configure. In the Organization Settings card, click Edit to open the settings dialog. Toggle Enable Single Sign-On (SSO) to on. An SSO Configuration section appears on the organization page.
Configure your identity provider
Create an OIDC application in your identity provider and collect the required connection details.
- Google
- Okta
- Entra ID
- In Google Cloud Console, go to APIs & Services > Credentials.
- Click Create Credentials > OAuth client ID.
- Select Web application as the application type.
- Complete the setup. You will add the redirect URI in a later step.
- The Issuer URL for Google is:
- From the credentials page, copy the Client ID and Client Secret.
Enter connection details
In the OIDC Configuration section on the organization page, enter the following values from your identity provider:
- Issuer URL — The OIDC issuer URL for your identity provider. The field includes inline examples showing the expected URL format for Google, Okta, and Microsoft Entra ID.
- Client ID — The client ID of the application you created.
- Client Secret — The client secret of the application you created. Use the show/hide toggle to verify the value.
Configure redirect URI
After saving, a Redirect URI populates in the Console. Copy this URI and add it to your identity provider’s application settings:
- Google — Paste the URI in the Authorized redirect URIs field in the OAuth client settings.
- Okta — Paste the URI in the Sign-in redirect URIs field in the application’s Login settings.
- Entra ID — Add the URI under Redirect URIs in the application registration’s Authentication settings.
The Redirect URI does not populate until SSO settings have been saved in the Console.
Verify Domains
Add domain
In the SSO Domains section below the OIDC configuration, enter your domain name in the text box and click the Add button. If no domains have been configured yet, the section displays “No domains configured”.
Add TXT record
In your DNS provider, add a new TXT record. The record name must be
_strata and the value must be the string copied from the Console.Enable Domains
After a domain is verified, it appears in the Domains list with a toggle switch. The domain is disabled by default after verification. Enable SSO for the domain by toggling the switch to the On position. You can disable SSO for a domain by toggling the switch back to Off. You can also delete a domain using the trash icon, but if you want to use that domain again in the future you will need to re-enter the details and re-verify it.Troubleshooting
Domain does not validate
Domain does not validate
Verify that the DNS TXT record is configured correctly. The record name must
be
_strata, the record type must be TXT, and the value must be copied
exactly from the Console. DNS propagation can take up to 48 hours.Internal error during authentication flow
Internal error during authentication flow
This error typically indicates an SSO configuration issue. Check the
following:
- Issuer URL — Verify that you entered the issuer URL, not the
.well-knownURL for the registered application. - Missing claims — Verify that your identity provider returns
email,given_name, andfamily_nameclaims in the ID token. - User permissions — Verify that users have permission to use the application in your identity provider.
- User profiles — Verify that user profiles include all required claim
values (
email,given_name,family_name).
Users cannot sign in after SSO changes
Users cannot sign in after SSO changes
If SSO was enabled and then disabled, existing SSO users must sign in with
an alternative method. If SSO was re-enabled, verify that the domain toggle
is in the On position and that the OIDC connection details (Issuer URL,
Client ID, Client Secret) are still valid.