IdP claim mapping
For IdP-delegated teams to evaluate correctly at login, the tokens your identity provider sends to Platform must include a groups claim. This page lists the per-IdP configuration steps for the supported providers.
Enterprise reads the IdP's tokens directly.
OIDC providers
Okta
- In the Okta administrator console, open Security, then API, then Authorization Servers.
- Select the authorization server backing your Seqera application (typically
default). - Open Claims, then Add claim.
- Set:
- Name:
groups - Include in token type: ID Token (and Access Token if you use access tokens for downstream services)
- Value type: Groups
- Filter: Match the groups you want exposed (
Matches regex .*to expose all of them).
- Name:
- Select Save.
Entra ID
Entra ID requires an app-registration change and attention to the format Entra emits.
- In the Azure portal, open the app registration that backs your Platform connection.
- Open Token configuration, then Add groups claim.
- Select the group types you want emitted (typically Security groups).
- Under Customize token properties by type, choose whether to emit Group ID (object GUIDs) or sAMAccountName (display names where supported).
- Confirm via Entra ID's Token Preview that a sample sign-in includes the
groupsclaim.
caution
With Group ID selected, Entra ID emits group object GUIDs. You have two options:
- Use the GUID values directly as the catalog identifier and the IdP Group field on each team. This works but makes the catalog harder to read.
- Configure Entra ID to emit display names instead. Set sAMAccountName as the source where supported, or post-process via a custom claims policy.
The GUID and the display name don't both flow at the same time, so pick one approach for your tenant and stick with it.
Verify the mapping
After saving the IdP changes, confirm the claim is reaching Platform::
- Sign in to Platform as a test user via SSO.
- In your Platform instance logs, look for the SSO callback log line. It records the full claim set received.
- Confirm the
groupsclaim is present and contains the expected group identifiers.
caution
If the user's token has no groups claim or the claim is malformed, no changes take place.