Single sign-on (SSO)
Infracost Cloud supports authenticating with Enterprise SSO providers. To set up SSO with Infracost Cloud:
- Go to Infracost Cloud and sign up with your email and a password. You will delete this user after SSO is enabled.
- From the top dropdown menu, create a new organization for your company.
- Email hello@infracost.io to purchase Infracost.
- Follow the applicable sections below to setup SSO, each option ends with a form where you enter your SSO details.
Azure Active Directory
- In the Infracost Cloud dashboard go to
Org Settings
and copy yourOrg ID
. You will need to provide this to Infracost in a future step. - Login to the Azure portal
- Go to
Azure Active Directory > App registrations
- Click
New registration
- For the name enter
Infracost Cloud
- For the Redirect URL select
Web
for the platform and enterhttps://login.infracost.io/login/callback
- Click on
Add a certificate or secret > New client secret
- Copy the Application (client) ID. You will need to provide this to Infracost in a future step.
- Add a client secret with Description
Infracost Cloud SSO
that expires in 24 months. - Copy the Client Secret Value. You will need to provide this to Infracost in the next step.
- Fill out the SSO setup form here, providing the Application (client) ID, Client secret value and the domain you want enabled for SSO.
Okta
- In the Infracost Cloud dashboard go to
Org Settings
and copy yourOrg ID
. You will need to provide this to Infracost in a future step. - Login to the Okta Admin dashboard
- Go to
Applications > Applications
- Click
Create App Integration
- Select
SAML 2.0
and click Next. - For the App name enter
Infracost Cloud
and click Next. - For Single sign on URL enter
https://login.infracost.io/login/callback?connection=<YOUR INFRACOST ORG ID>
- For the Audience URL (SP Entity ID) enter
urn:auth0:infracost:<YOUR INFRACOST ORG ID>
- Add the following for the Attribute Statements section and click Next.
- Choose 'I'm an Okta customer adding an internal app' and click Finish
- In the Sign on tab, scroll down to the SAML Signing Certificates section. On the right-hand side click the button to View SAML setup instructions.
- Copy the Identity Provider Single Sign-On URL and download the certificate.
- Fill out the SSO setup form here, providing the Identity Provider Single Sign-On URL, certificate and the domain you want enabled for SSO.
- In the Okta Admin dashboard assign any users to the Infracost Cloud app.
Google Workspace
- In the Infracost Cloud dashboard go to
Org Settings
and copy yourOrg ID
. You will need this when setting up the SAML app in Google Workspace. - Login to Google Workspace admin
- Go to
Apps > Web and mobile apps
- Click
Add app > Add custom SAML app
- For the App name enter
Infracost Cloud
- Copy the SSO URL and download the Certificate. You will need to supply these to Infracost in a future step. Click Continue.
- In the ACS URL enter:
https://login.infracost.io/login/callback?connection=<YOUR INFRACOST ORG ID>
- In the Entity ID enter:
urn:auth0:infracost:<YOUR INFRACOST ORG ID>
- Tick
Signed response
- For Name ID format choose
UNSPECIFIED
and for Name ID chooseBasic Information > Primary email
. The form should look like the following: - Click Continue
- Add the following Attributes and click Finish:
- Fill out the SSO setup form here, providing the SSO URL, Certificate and the domain you want enabled for SSO.
Other SAML providers
- In the Infracost Cloud dashboard go to
Org Settings
and copy yourOrg ID
. You will need to provide this in the next step. - Fill out the SSO setup form here, providing the SSO URL, certificate and the domain you want enabled for SSO.
- In the Infracost Cloud dashboard go to
- Once we receive the form, we will email you to schedule a quick screenshare call to enable SSO. On the call, we will verify your SSO connection is configured correctly and delete the initial user that was created without SSO.
After SSO is configured, any user authenticating with your company domain name in the usual log in page will be redirected to your SSO provider for authenticating.