SSO is available on Enterprise plans only. Contact us to learn more or upgrade.
Enable SSO
Open organization settings
Click your account name at the bottom of the sidebar, then click the gear icon next to your organization name.
Go to Single Sign-On
In the left sidebar, click Single Sign-On. You’ll see the SSO configuration panel.

Configure your identity provider
Choose your IdP below and follow the setup steps.- Okta
- Microsoft Entra ID
Create a SAML 2.0 application in Okta
In your Okta admin dashboard, go to Applications → Create App Integration. Select SAML 2.0 as the sign-in method.



Configure SAML settings
Enter the following values from the Cassidy SSO configuration page:

| Okta field | Value |
|---|---|
| Single sign-on URL | Copy from Cassidy SSO settings |
| Audience URI (SP Entity ID) | Copy from Cassidy SSO settings |

Add attribute statements
Map the following user attributes so Cassidy can identify users:

| Name | Value |
|---|---|
email | user.email |
firstName | user.firstName |
lastName | user.lastName |

Assign users to the app
In Okta, go to the Assignments tab of your new app and assign it to the users or groups who should have access to Cassidy.

Verify and enable
After entering your IdP settings into Cassidy, click Verify and Enable to activate the SSO connection.
Verify your domain
You also need to verify that you own the email domain your team uses to sign in.Add your domain
In the Cassidy SSO settings, click Add Verified Domain and enter the email domain you want to enable for SSO (e.g., 

yourcompany.com).

Add the DNS record
Cassidy will provide a TXT record to add to your domain’s DNS settings. Copy the record value and add it to your DNS provider.

Initiate verification
Once you’ve added the TXT record to your DNS provider, return to Cassidy and click Verify Domain.

Set up SAML group mappings
SAML group mappings let you map attributes in your identity provider’s SAML response to Cassidy groups. This allows you to centrally manage user access in your IdP and have Cassidy automatically provision the right permissions when users sign in. When a user signs in through your IdP, Cassidy checks the user’s SAML assertion and adds the user to Cassidy groups based on the mappings you’ve configured.Important behavior
- Case-sensitive — Attribute keys and values must match exactly.
- Additive only — Cassidy adds users to groups when a mapping matches, but does not remove users from groups if the attribute is later removed in your IdP. Users also keep any groups they were already in.
- Multi-value attributes supported — If an attribute contains multiple values (e.g., a
groupsattribute with a list of group IDs), the mapping matches if any of the values exactly equals the mapping’s configured value.
Prerequisites
Before turning on mappings, make sure you understand exactly what attributes your IdP is sending in the SAML assertion — mappings only work if the attribute key and value are correct.
- Many IdPs require you to explicitly configure which attributes (including group membership) are included in the SAML assertion. If group membership isn’t being sent, Cassidy won’t have anything to map.
- Microsoft Entra ID often sends group Object IDs rather than group names. If you map by group, you typically need to use the ID values Entra ID sends.
- It’s recommended to inspect and validate a SAML response to confirm the exact attribute key and value your IdP is sending (e.g., using samltool.com) before creating mappings.
- SSO must be enabled for your organization before you can configure group mappings.
Configure mappings
Create a new mapping
Click Add Group Mapping to create a new mapping rule. Enter:
- SAML Attribute Key — The attribute name your IdP sends (e.g.,
groups,memberOf, or a custom attribute). - SAML Attribute Value — The specific value to match (e.g., a group name or group Object ID, depending on your IdP).
- Cassidy Group — The Cassidy group to assign users to when the match is found.

Ensure your IdP sends group attributes
Your IdP must include group membership in the SAML assertion under the same attribute key you configured in the mapping. If group membership isn’t being sent, Cassidy won’t have anything to map.
- Microsoft Entra ID
- Okta
In Entra ID, add a Group Claim in the Attributes & Claims section of your SAML application and set a custom claim name (e.g., 
groups). Entra ID typically sends group Object IDs rather than names, so use the ID values as your SAML Attribute Value.
Add mappings for each group
Back in Cassidy, repeat step 2 for each group you want to map. The key should match the attribute name your IdP sends, and the value should match the exact value sent by your IdP for each group.
To learn more about creating and managing groups in Cassidy, see Assign roles and groups.

Save and test
Click Save. Mappings are applied the next time users sign in via SSO. Have a team member sign in to verify they are automatically assigned to the correct Cassidy groups based on their SAML group membership.
Group mappings are active. Users will be automatically assigned to Cassidy groups on their next SSO login.
Next steps
Assign roles and groups
Create and configure the Cassidy groups that SSO maps to.
Invite team members
Manually invite users who aren’t covered by SSO.









