Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.clarifeye.ai/llms.txt

Use this file to discover all available pages before exploring further.

Overview

Clarifeye supports both OpenID Connect (OIDC) and SAML Single Sign-On (SSO) so you can manage access using your existing Identity Provider (IdP).
SSO is not available on all plans. Please contact us at support@clarifeye.ai to enable it for your organization.

Supported Identity Providers

Clarifeye works with all major standards‑compliant IdPs, including but not limited to:
  • Okta
  • Microsoft Entra ID (Azure AD)
  • Google Workspace
  • OneLogin

How to enable SSO

To initiate setup, contact Clarifeye Support at support@clarifeye.ai or through the chat widget on the bottom right of the screen with your organization details and preferred protocol (OIDC or SAML).

OpenID Connect (OIDC)

  • Clarifeye will provide your tenant-specific Login URL, redirect url is of the form: https://<your-domain>.clarifeye.ai/accounts/oidc/specific-id/login/callback
  • You will configure your IdP application to use that Login URL and complete any required claims according to your IdP’s standard OIDC setup.

SAML 2.0

Clarifeye will provide the following values for your IdP configuration:
  • ACS (Assertion Consumer Service) URL (example: https://<your-domain>.clarifeye.ai/accounts/saml/specific-id/acs/)
  • Entity ID / Audience URI (example: urn:clarifeye.ai:specific-id)
Use the following attribute mapping in your IdP:
{
  "email": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier",
  "given_name": [
    "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname",
    "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name"
  ],
  "family_name": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname",
}
Then provide the following attributes to Clarifeye:
  • IdP Single Sign-On URL
  • X.509 Certificate

Activation

Once your IdP is configured, Clarifeye Support will enable the connection and activate SSO at the time you select.