SSO: supported identity providers and setup
SiteDetour supports SSO via OpenID Connect. Generic setup flow applicable to Azure AD, Okta, and other OIDC IdPs.
Overview
SiteDetour supports Single Sign-On via OpenID Connect (OIDC) on top of OAuth 2.0. If your identity provider speaks OIDC, you can configure SiteDetour to delegate authentication to it. This article covers the overall flow and the IdPs SiteDetour has built-in driver support for.
Plan requirement
SSO is available on Business and Enterprise plans. On lower tiers the SSO configuration page is read-only.
Supported identity providers
SiteDetour ships first-class driver integrations for:
- Azure AD / Microsoft Entra ID
- Okta Workforce Identity
For other OIDC-compliant providers (Google Workspace, OneLogin, Ping, Auth0, Keycloak, Google Cloud Identity, etc.), the generic OIDC driver can be configured by providing a discovery URL and client credentials. Contact support if your IdP doesn't appear in the driver dropdown.
What you need from your IdP
Every SSO setup requires the same three values from your IdP:
- Client ID — the public identifier of the application you register in your IdP for SiteDetour.
- Client Secret — the secret that authenticates SiteDetour to the IdP when exchanging authorization codes.
- Base URL / Issuer / Tenant URL — the OIDC discovery root for your organization (e.g.
https://your-tenant.okta.comorhttps://login.microsoftonline.com/{tenant-id}/v2.0).
What you need to give your IdP
Your IdP needs the SiteDetour Reply URL (also called Redirect URI or Callback URL). SiteDetour generates a unique reply URL per organization; you'll find it on the SSO configuration page.
Generic setup flow
- In your IdP, register a new application / enterprise app for SiteDetour. Register it as an OIDC / Web application.
- Add the SiteDetour reply URL as the allowed redirect URI.
- Copy the Client ID, generate a Client Secret, and note the issuer/base URL.
- In SiteDetour, open SSO. Pick the matching Driver from the dropdown (Azure AD, Okta Workforce Identity, or generic).
- Paste in Client ID, Client Secret, and Base URL.
- Toggle Enabled on.
- Click Save.
User provisioning
SiteDetour does not auto-create users from the IdP's directory. Every user who will sign in via SSO must first be invited to the SiteDetour organization on the Organization page. This is deliberate: permission level (Owner/Admin/Edit/Read) is stored in SiteDetour, not in the IdP.
Signing in via SSO
SSO users visit sitedetour.com/login/sso and enter their email. SiteDetour looks up the matching organization and redirects them to the configured IdP. On successful IdP authentication, SiteDetour signs them in.
Azure AD specifics
For the Azure-specific walkthrough (creating the Enterprise App, generating secrets, configuring the reply URL), see Enabling SSO for Azure AD.
Troubleshooting
- "User not found" after successful IdP login. The email returned by the IdP must match a user invited to the SiteDetour Organization page. Check for case mismatch or subdomain differences.
- "Invalid redirect URI" from IdP. Copy the reply URL from SiteDetour verbatim, including case. Some IdPs are strict.
- Token exchange fails. Regenerate the client secret, paste in again, save.

