This documentation provides comprehensive guidance for setting up Single Sign-On (SSO) authentication with Devana.ai. The system supports multiple SSO providers and can be configured at the whitemark level to control user authentication methods.
Devana.ai supports the following SSO providers:
Each whitemark instance can be configured with specific SSO settings:
Defines which SSO providers are permitted for the whitemark. Can include one or more of:
APPLEAUTHENTIKAZUREADGITHUBGOOGLELDAPOAUTH2OPENID_CONNECTControls the authentication methods available:
CREDENTIALS - Traditional email/password authenticationSSO - Single Sign-On authentication onlyMixed Authentication (SSO + Credentials):
{
"allowedProviders": ["AZUREAD", "GOOGLE"],
"registrationType": ["SSO", "CREDENTIALS"]
}
SSO-Only with Single Provider:
{
"allowedProviders": ["AZUREAD"],
"registrationType": ["SSO"]
}
Note: This configuration will automatically redirect users to the Azure AD login.
Multiple SSO Providers:
{
"allowedProviders": ["AZUREAD", "GOOGLE", "GITHUB"],
"registrationType": ["SSO"]
}
Each SSO provider requires specific environment variables. Refer to the individual provider documentation for details.
Use the admin interface or GraphQL mutations to configure:
allowedProviders: Array of enabled SSO providersregistrationType: Array of allowed authentication typesVerify that users can successfully authenticate using the configured providers.
All SSO providers implement CSRF protection using state parameters to prevent cross-site request forgery attacks.
Each SSO authentication is tied to a specific whitemark instance based on the domain, ensuring users authenticate within the correct organizational context.
No whitemark found:
Invalid state parameter:
No email found in profile:
Enable debug logging by setting appropriate log levels in your environment configuration. Authentication errors are logged with detailed information to help diagnose issues.
For detailed setup instructions for each provider, see: