This guide outlines how IT administrators can integrate an identity provider (IDP), such as Okta or Entra ID (Azure AD), with Trusst AI.
Youβll need to configure an application in your IDP, set up role-based groups matching exactly those specified in Trusst AI Roles and Permissions, and expose these groups in the ID token.
Step 1: Create Security Groups for Roles
Create security groups in your IDP exactly matching these roles:
trusst_ai_viewer
trusst_ai_evaluator
trusst_ai_prompt_admin
trusst_ai_agent_admin
trusst_ai_app_admin
Okta:
Directory β Groups β Add Group β (Role name)
Entra ID:
Azure AD β Groups β New group β Security β (Role name)
Step 2: Assign Users to Role Groups
Assign users to the groups representing their required roles.
Okta:
Directory β Groups β (Role group) β People β Assign People
Entra ID:
Azure AD β Groups β (Role group) β Members β Add Members
Step 3: Register Trusst AI Application
Register a new OIDC web application for Trusst AI.
Okta:
Applications β Create App Integration β OIDC β Web Application