SSO Setup
Logfire Enterprise Cloud supports Single Sign-On (SSO) via OIDC-compatible identity providers, including Okta, Microsoft Azure Entra ID, and Keycloak. Under the hood, Logfire uses Dex, an open-source OIDC gateway.
This guide uses Microsoft Azure Entra ID as an example, but the general steps — registering an OIDC app, obtaining a Client ID, Client Secret, and Issuer URL, then connecting it in Logfire — apply to any supported provider.
- Enterprise Cloud plan enabled on your Logfire organization
- Admin access to your Logfire organization settings
- Admin access to Microsoft Azure Entra ID (to create and configure an app registration)
- Log in to Logfire and switch to your Enterprise Cloud organization.
- Go to Settings in the left-hand menu.
- Scroll down to the Identity Providers section.
- Note the Redirect URI shown — you will need this when configuring the Azure app.
- Sign in to the Azure portal as an admin.
- Navigate to Microsoft Entra ID → App registrations → New registration.
- Give the app a name (e.g.,
Logfire SSO). - Under Supported account types, select the option appropriate for your organization (typically Accounts in this organizational directory only).
- Under Redirect URI, choose Web (not Single-page application) and paste the Redirect URI copied from Logfire.
- Click Register.
- In your new app registration, go to Certificates & secrets → New client secret.
- Add a description and choose an expiry period.
- Click Add and immediately copy the secret value — it will not be shown again.
From your app registration, gather the following:
| Value | Where to Find It |
|---|---|
| Client ID | App registration Overview page → Application (client) ID |
| Client Secret | The value you just created in Step 3 |
| Tenant ID | App registration Overview page → Directory (tenant) ID |
- Return to Logfire → Organization Settings → Identity Providers.
- Click Add OIDC Provider and select Azure (Microsoft Entra ID).
- Fill in the fields:
- Client ID: your Azure Client ID
- Client Secret: your Azure Client Secret
- Issuer:
https://login.microsoftonline.com/\{tenant-id\}/v2.0(replace\{tenant-id\}with your actual Tenant ID)
- Click Submit.
After submitting, click the Connect button next to the Entra ID provider.
A request will be sent to your Azure admin for approval. The Azure admin should approve this in the Entra ID admin center. Once approved, the identity provider status will update to Linked.
- Log out of Logfire.
- Navigate to your organization’s SSO login URL:
(replacehttps://logfire.pydantic.dev/login/{org-name}\{org-name\}with your organization’s handle) - Click Continue with Entra ID and verify you can log in successfully with your corporate credentials.
- Go to your Enterprise Cloud organization in Logfire.
- Navigate to Settings → Invite Members.
- Create an invite link (set it to never expire for convenience if you plan to share it in internal documentation).
- Share the invite link with your team — if users are not already authenticated, it will automatically redirect them to your SSO login page.
During the transition, existing login methods (e.g., Google, GitHub) remain active, so current users are not disrupted.
Once your team has successfully migrated to Entra ID SSO:
- You can disconnect individual login methods from Organization Settings → Identity Providers.
- Advise team members to use the SSO login URL going forward. If other providers are still enabled, users may inadvertently log in with their personal accounts instead.
Users who joined the organization before SSO was configured need to connect their existing account to the new identity provider. For example, if a user previously logged in with GitHub and the organization has now set up Azure Entra ID:
- The user logs in with GitHub (their existing provider).
- They navigate to Organization Settings → Account connections.
- They connect their account to Azure Entra ID.
- After linking, the user can log in with either GitHub or Azure.
| Step | Action |
|---|---|
| 1 | Copy the Redirect URI from Logfire Organization Settings |
| 2 | Create a Web app registration in Azure Entra ID with that Redirect URI |
| 3 | Generate a Client Secret in Azure |
| 4 | Collect Client ID, Client Secret, and Tenant ID |
| 5 | Add Azure OIDC provider in Logfire with Issuer URL https://login.microsoftonline.com/\{tenant-id\}/v2.0 |
| 6 | Connect Entra ID and approve the request in Azure |
| 7 | Test SSO login via https://logfire.pydantic.dev/login/\{org-name\} |
| 8 | Share the invite link with your team (redirects to SSO login if unauthenticated) |
See also: Enterprise Plan Overview