sub
and email
Settings
-> Members and roles
-> SSO Configuration
SAML metadata URL
or SAML metadata XML
Default workspace role
and Default workspaces
. New users logging in via SSO will be added to the specified workspaces with the selected role.Default workspace role
and Default workspaces
are editable. The updated settings will apply to new users only, not existing users.SAML metadata URL
and SAML metadata XML
are editable. This is usually only necessary when cryptographic keys are rotated/expired or the metadata URL has changed but the same IdP is still used.Login via SSO only
checkbox and click Save
. Once this happens, users accessing the organization that are logged-in via a non-SSO login method are required to log back in using SAML SSO. This setting can be switched back to allow all login methods by unselecting the checkbox and clicking Save
.
Only SAML SSO
. This is to ensure the SAML settings are valid and avoid locking users out of your organization.User ID
through an email change while others do not, so we recommend that you follow these steps to avoid duplicate users in LangSmith:
Entra ID
service.
Create your own application
.
LangSmith
)Integrate any other application you don't find in the gallery (Non-gallery)
.Create
.
Manage > Single sign-on
.
SAML
.
Basic SAML Configuration
Identifier (Entity ID)
: https://auth.langchain.com/auth/v1/sso/saml/metadataReply URL (Assertion Consumer Service URL)
: https://auth.langchain.com/auth/v1/sso/saml/acsRelay State
, Logout Url
, and Sign on URL
emptySave
Namespace
: http://schemas.xmlsoap.org/ws/2005/05/identity/claims
sub
: user.objectid
emailaddress
: user.userprincipalname
or user.mail
(if using the latter, ensure all users have the Email
field filled in under Contact Information
)Unique User Identifier (Name ID)
SAML Certificates
, copy the App Federation Metadata Url
.
Fill in required information
step, using the metadata URL from the previous step.
Step 4: Verify the SSO setup
Manage > Users and groups
Add user/group
None Selected
.Select
.Assign
.SSO Configuration
page, or go to Manage > Single sign-on
and select Test single sign-on with <application name>
Menu -> Apps -> Web and mobile apps
.
Add App
and then Add custom SAML app
.
Continue
.
IDP metadata
and save it for Step 2 below. Click Continue.
Service Provider Details
window, enter:
ACS URL
: https://auth.langchain.com/auth/v1/sso/saml/acsEntity ID
: https://auth.langchain.com/auth/v1/sso/saml/metadataStart URL
and the Signed response
box empty.Name ID
format to EMAIL
and leave Name ID
as the default (Basic Information > Primary email
).Continue
.Add mapping
to ensure required claims are present:
Basic Information > Primary email
-> email
Fill in required information
step, using the IDP metadata
from the previous step as the metadata XML.
Step 3: Turn on the SAML app in Google
Menu -> Apps -> Web and mobile apps
User access
.
On for everyone
, and then click Save
.
On
.Inherited
and you want to keep the updated setting, even if the parent setting changes, click Override
.Overridden
, either click Inherit
to revert to the same setting as its parent, or click Save
to keep the new setting, even if the parent setting changes.SSO Configuration
page, or go to the SAML application page in Google and click TEST SAML LOGIN
.
Okta Admin console
.
Applications > Applications
click Create App Integration
SAML 2.0
App name
(e.g. LangSmith
) and optionally an App logo
, then click Next
Configure SAML
page:
Single sign-on URL
a.k.a. ACS URL
: https://auth.langchain.com/auth/v1/sso/saml/acs. Keep Use this for Recipient URL and Destination URL
checked.Audience URI (SP Entity ID)
: https://auth.langchain.com/auth/v1/sso/saml/metadataName ID format
: EmailAddress
Application username
: email
Finish
Metadata URL
from the Sign On
page to use in the next step
Fill in required information
step, using the metadata URL from the previous step.
Step 3: Assign users to LangSmith in Okta
Applications > Applications
, select the SAML application created in Step 1Assignments
tab, click Assign
then either Assign to People
or Assign to Groups
Assign
and Done
SSO Configuration
page, or have a user select the application from their Okta dashboard.