SSO is available on Enterprise plans only. Contact us to learn more or upgrade.
Verify your domain
Before you can enable SSO, you need to verify that you own the email domain your team uses to sign in.Open organization settings
Click your account name at the bottom of the sidebar, then click the gear icon next to your organization name.
Go to Single Sign-On
In the left sidebar, click Single Sign-On. You’ll see the SSO configuration panel.

Add your domain
Click Add Verified Domain and enter the email domain you want to enable for SSO (e.g., 

yourcompany.com).

Add the DNS record
Cassidy will provide a TXT record to add to your domain’s DNS settings. Copy the record value and add it to your DNS provider.

Initiate verification
Once you’ve added the TXT record to your DNS provider, return to Cassidy and click Verify Domain.

Enable SSO
Once you have at least one verified domain, you can enable SSO.Click Enable Single Sign-On
On the Single Sign-On settings page, click Enable Single Sign-On. This opens the SSO configuration modal.

The modal has two sections:


- Identity provider details — Enter your IdP’s Entity ID, SSO URL, and public certificate. You can fill these in manually, or upload your IdP’s metadata XML to auto-fill all three fields at once.
- Service provider details — Copy Cassidy’s Entity ID and Sign-In URL into your IdP’s configuration. Some IdPs also support importing an SP metadata file — click download our SP metadata to get the file.
Configure your identity provider
Cassidy works with any SAML 2.0 identity provider. Below are step-by-step guides for Okta and Microsoft Entra ID — if you use a different provider, the general flow is the same: create a SAML application in your IdP, enter Cassidy’s SP values, configure attribute mappings, and copy your IdP’s values back into Cassidy.- Okta
- Microsoft Entra ID
Create a SAML 2.0 application in Okta
In your Okta admin dashboard, go to Applications → Create App Integration. Select SAML 2.0 as the sign-in method.



Configure SAML settings
Enter the following values from Cassidy’s SSO configuration modal:

| Okta field | Value |
|---|---|
| Single sign-on URL | Copy from Cassidy SSO settings |
| Audience URI (SP Entity ID) | Copy from Cassidy SSO settings |

Add attribute statements
Map the following user attributes so Cassidy can identify users:

| Name | Value |
|---|---|
email | user.email |
firstName | user.firstName |
lastName | user.lastName |

Assign users to the app
In Okta, go to the Assignments tab of your new app and assign it to the users or groups who should have access to Cassidy.

Verify and enable
After entering your IdP settings into the Cassidy configuration modal, click Verify and Enable. You’ll be redirected through the SAML sign-in process to verify your settings are correct.
SSO sign-in respects your organization’s join settings. If your organization requires invitations or admin approval for new members, those rules still apply when users sign in through SSO for the first time. See Invite team members for details.
SSO is now enabled. Team members with email addresses on your verified domain will be redirected to your identity provider when signing in.
Set up SAML group mappings
SAML group mappings let you map attributes in your identity provider’s SAML response to Cassidy groups. This allows you to centrally manage user access in your IdP and have Cassidy automatically provision the right permissions when users sign in. When a user signs in through your IdP, Cassidy checks the user’s SAML assertion and adds the user to Cassidy groups based on the mappings you’ve configured.Important behavior
- Case-sensitive — Attribute keys and values must match exactly.
- Additive only — Cassidy adds users to groups when a mapping matches, but does not remove users from groups if the attribute is later removed in your IdP. Users also keep any groups they were already in.
- Multi-value attributes supported — If an attribute contains multiple values (e.g., a
groupsattribute with a list of group IDs), the mapping matches if any of the values exactly equals the mapping’s configured value.
Prerequisites
Before turning on mappings, make sure you understand exactly what attributes your IdP is sending in the SAML assertion — mappings only work if the attribute key and value are correct.
- Many IdPs require you to explicitly configure which attributes (including group membership) are included in the SAML assertion. If group membership isn’t being sent, Cassidy won’t have anything to map.
- Microsoft Entra ID often sends group Object IDs rather than group names. If you map by group, you typically need to use the ID values Entra ID sends.
- It’s recommended to inspect and validate a SAML response to confirm the exact attribute key and value your IdP is sending (e.g., using samltool.com) before creating mappings.
- SSO must be enabled for your organization before you can configure group mappings.
Configure mappings
Create a new mapping
Click Add Group Mapping to create a new mapping rule. Enter:
- SAML Attribute Key — The attribute name your IdP sends (e.g.,
groups,memberOf, or a custom attribute). - SAML Attribute Value — The specific value to match (e.g., a group name or group Object ID, depending on your IdP).
- Cassidy Group — The Cassidy group to assign users to when the match is found.

Ensure your IdP sends group attributes
Your IdP must include group membership in the SAML assertion under the same attribute key you configured in the mapping. If group membership isn’t being sent, Cassidy won’t have anything to map.
- Okta
- Microsoft Entra ID
In Okta, configure a group attribute statement in your SAML application’s settings. This tells Okta to include the user’s group memberships in the SAML assertion.

Add mappings for each group
Back in Cassidy, repeat step 2 for each group you want to map. The key should match the attribute name your IdP sends, and the value should match the exact value sent by your IdP for each group.
To learn more about creating and managing groups in Cassidy, see Assign roles and groups.

Save and test
Click Save. Mappings are applied the next time users sign in via SSO. Have a team member sign in to verify they are automatically assigned to the correct Cassidy groups based on their SAML group membership.
Group mappings are active. Users will be automatically assigned to Cassidy groups on their next SSO login.
Next steps
Assign roles and groups
Create and configure the Cassidy groups that SSO maps to.
Invite team members
Manually invite users who aren’t covered by SSO.








