🔑Integrating Your Identity Provider
This guide outlines how IT administrators can integrate an identity provider (IDP), such as Okta or Entra ID, with Trusst AI.
You’ll need to configure an application in your IDP using the Trusst AI Single Sign-On setup link provided to you. This link launches a guided, self-service configuration flow to connect your identity provider (Okta or Microsoft Entra ID) with Trusst AI.
Trusst AI reads user roles from the roles claim by default.
If your identity provider does not include a roles claim, Trusst AI will also accept a role (singular) or groups claim.
Both must be arrays of strings.
Step 1: Configure Single Sign-On
Use the Configure Single Sign-On link sent to you by Trusst AI.
This self-service setup will:
Guide you through creating a new application in your IDP.
Provide your unique Client ID, Client Secret, and Callback URL.
Establish the OIDC/SAML connection.
Test and confirm authentication between your IDP and Trusst AI.
Once complete, you will have a configured Trusst AI application in your IDP.
Step 2: Create Role Keys in Your IDP
Create roles (Entra ID) or groups (Okta) in your identity provider matching these Trusst AI role keys exactly:
trusst_ai_viewertrusst_ai_analysttrusst_ai_editortrusst_ai_admin
Okta: Directory → Groups → Add Group → (Role key)
Entra ID: Microsoft Entra ID → App registrations → (Trusst AI App) → App roles → Add app role → (Role key)
Step 3: Assign Users to Roles
Assign users to the role groups or app roles that correspond to their level of access.
Okta: Directory → Groups → (Role group) → People → Assign People
Entra ID: Enterprise Applications → (Trusst AI App) → Users and groups → Add user/group → Assign to role
Step 4: Expose Role or Group Claims in the Token
Ensure your ID token includes either a roles or groups claim.
Okta:
Applications → (Trusst AI App) → Sign On → Claims → Edit
Claim name: roles
Groups claim type: Filter
Filter: Starts with → trusst_ai
Entra ID:
Roles are automatically included in the roles claim once users or groups are assigned to app roles.
Step 5: Verify Access
After setup, sign in with a user assigned to one or more Trusst AI roles. If successful, the correct permissions will appear within Trusst AI.
If any issues occur, contact your Trusst AI integration contact.
Note:
Trusst AI reads the
rolesclaim first, falling back torole(singular) orgroupsif missing.Claims must be arrays of strings containing valid Trusst AI role keys.
For detailed role definitions, see Trusst AI Roles and Permissions.
Last updated