Skip to main content
SSO requires a Business or Enterprise plan. View plans
Single Sign-On (SSO) lets your team sign in to Invent using your existing identity provider (IdP), such as Okta, Microsoft Entra ID, Google Workspace, Auth0, or any other standards-compliant OIDC provider. Instead of managing a separate password, your members authenticate through the provider you already trust. Access SSO settings at useinvent.com/o/settings/sso.
SSO settings overview

How SSO Works in Invent

SSO in Invent is built on three pieces that work together:

Access Policy

Org-wide rules for which login methods (SSO, Google, email code) are allowed for users on your verified domains.

Domains

Email domains your organization has claimed and verified. Controls auto-join, default roles, and profile sync for users who sign up with a matching email.

Profiles

Identity provider configurations (Okta, Entra ID, Google, etc.). Each profile is an OIDC connection your users can sign in through.
Once you have at least one verified domain and one enabled profile, users whose email matches your domain will see your SSO option on the Invent sign-in page.

Key Concepts

Verified Domains

A domain is an email domain you’ve proven your organization owns (for example, acme.com). Verification happens through a one-time 6-digit code sent to an address on that domain. A domain can only be claimed by one organization in Invent. The first org to verify wins.

SSO Profiles

A profile is the OIDC configuration for one identity provider. You can have multiple profiles in the same org, for example one for your main workforce IdP and another for a contractor IdP. Invent automatically recognizes popular vendors by their issuer URL and shows the matching logo and name.

Just-in-Time (JIT) Provisioning

When a user signs in through SSO for the first time and no Invent account exists, Invent creates one automatically. You can disable this per-profile if you’d rather invite users explicitly.

Auto-Join

When a new user signs up with an email matching a verified domain, they can be automatically added to your organization as a member with a default role you set. This applies to all sign-in methods, not just SSO. Someone invited to Invent through Google sign-in using their @acme.com email would still be auto-joined.

Profile Sync

On every SSO sign-in, Invent can refresh the user’s name, avatar, and email from the IdP. This keeps identity data in sync with your directory of record and optionally locks users out of editing it themselves.

Who Can Manage SSO

SSO management requires:
  • Admin role in the organization
  • Business or Enterprise plan
Members with Developer, Manager, or Staff roles cannot view or edit SSO settings.

What End Users See

Users on your verified domains get a clean, branded sign-in experience:
  1. They visit the Invent sign-in page and click Use SSO instead.
  2. They enter their company email and click Sign in with SSO.
  3. Invent looks up your SSO configuration and redirects them to your IdP.
  4. After authenticating with your IdP, they’re signed in to Invent.
If you’ve restricted Google and email-code sign-in on the Access Policy, SSO becomes the only way in for users on your domain. See the full sign-in flow →

Plan Limits

FeaturePay As You GoBusinessEnterprise
SSO Domains550
SSO Profiles550
OIDC Providers
Access Policy
Session TTL Control

Setup Checklist

Ready to roll out SSO? Follow this order:
1

Verify your domain

Claim and verify the email domain your team uses (e.g. acme.com). You’ll receive a 6-digit code by email.
2

Configure your identity provider

Create an OIDC application in your IdP. Copy Invent’s Redirect URIs into your IdP’s allowed redirect list.
3

Create an SSO profile

Add a profile in Invent with your IdP’s Issuer URL, Client ID, and Client Secret. Invent auto-discovers the rest from your IdP’s .well-known endpoint.
4

Test the sign-in flow

Sign out and sign in again using your company email. You should see your IdP in the SSO picker.
5

Tune your access policy

Once SSO works end-to-end, decide whether to keep Google and email-code sign-in on or require SSO exclusively for your domain.

Supported Identity Providers

Invent speaks standards-compliant OpenID Connect (OIDC), so it works with any OIDC-capable IdP. We have first-class display recognition (name + logo) for:
  • Microsoft Entra ID (formerly Azure AD)
  • Google Workspace
  • Okta
  • Auth0
  • PingOne / Ping Identity
  • OneLogin
  • JumpCloud
  • Amazon Cognito
  • IBM Security Verify
  • Oracle Identity Cloud Service
  • Cisco Duo
Any other OIDC provider works too. It’ll simply show as a generic OIDC connection.
SAML 2.0 is on the roadmap but not yet supported for sign-in. If your IdP only speaks SAML, reach out. We can often expose an OIDC endpoint on the same IdP.