Skip to main content
SSO functionality is available on the Enterprise plan.
Tightknit supports enterprise Single Sign-On (SSO) to integrate with your organizationโ€™s identity provider.

Supported Protocols

  • OIDC (OpenID Connect)
  • SAML 2.0
  • Token-based JWT

Supported Flows

SP-Initiated Flow

Users start at Tightknit and authenticate via your IdP:
  1. User navigates to Tightknit login page
  2. User clicks โ€œSign in with [Your Company]โ€
  3. User authenticates at your IdP
  4. User is redirected back to Tightknit and logged in

IdP-Initiated Flow

Users start at your IdP portal and land on Tightknit already authenticated:
  1. User logs into your IdP portal
  2. User clicks a link within the IdP portal pointing to the Tightknit community site
  3. IdP redirects the user to Tightknit with a signed token
  4. User lands on Tightknit already logged in
IdP-initiated SSO requires Token-based JWT configuration. Please contact support to enable this feature.

OIDC Setup

Step 1: Contact Support

Contact [email protected] with:
  • Your company name
  • Your email domain (e.g., acme.com)
  • Your identity provider (Google Workspace, Okta, Azure AD, Auth0, etc.)
  • Display name for the login button (e.g., โ€œAcme Corpโ€)
We will provision your SSO configuration and send you:
  • Your Redirect URI to configure in your IdP
  • Any additional setup instructions

Step 2: Create Application in Your IdP

  1. Log into your IdP admin console
  2. Create a new Web Application or OIDC Client
  3. Name the application Tightknit
  4. Set the Redirect URI to the URL provided by Tightknit
  5. Set required scopes: openid, email, profile
  6. Enable PKCE if available

Step 3: Send Credentials to Tightknit

Send Tightknit support the following information:
FieldDescription
Client IDFrom your IdP application
Client SecretFrom your IdP application
Issuer URLYour IdPโ€™s issuer (see provider guides below)
Discovery URLOIDC discovery endpoint (optional)

Step 4: Test SSO

Once configured, test the integration:
  1. Navigate to your Tightknit login page
  2. Click โ€œContinue with [Your Company]โ€
  3. Authenticate at your IdP
  4. Verify you are redirected back and logged in

SAML Setup

Step 1: Contact Support

Contact [email protected] requesting SAML SSO setup. We will send you:
  • Service Provider (SP) metadata URL
  • ACS URL and Entity ID

Step 2: Configure Your IdP

  1. Create a SAML application in your IdP
  2. Upload or paste the SP metadata provided by Tightknit
  3. Configure attribute mappings:
    • nameID or email (required)
    • displayName or name (optional)
    • firstName, lastName (optional)

Step 3: Send IdP Metadata

Send Tightknit support the following information:
  • IdP metadata XML (preferred)
  • Or manually: Entry point URL, Certificate, Issuer

Token-Based SSO

For custom integrations where your system authenticates users and redirects them to Tightknit with a signed JWT. This enables IdP-initiated flows.

How It Works

  1. Your system authenticates the user
  2. You generate a signed JWT with user claims
  3. You redirect the user to Tightknit with the token
  4. Tightknit validates the token and creates a session

Setup

Contact [email protected] with the following information:
FieldDescription
IssuerYour token issuer URL
AudienceExpected audience claim
AlgorithmRS256 or ES256
JWKS URLURL to your public keys (preferred)
Public KeyPEM-encoded key (if not using JWKS)
Target URLYour Tightknit community URL
Login URLYour organizationโ€™s login URL
We will provision your configuration and provide you with the callback endpoint URL.

Supported Token Delivery Formats

The following token delivery formats to the Tightknit callback endpoint are supported:
  • GET redirect with query param: token or sso_token or id_token
  • POST request:
    • Content-Type: application/x-www-form-urlencoded or multipart/form-data
    • Form data contains key: token or sso_token or id_token

JWT Requirements

Your signed JWT must include these claims:
ClaimRequiredDescription
emailYesUserโ€™s email address
expYesExpiration timestamp
iatYesIssued-at timestamp
issYesIssuer (must match configured value)
audYesAudience (must match configured value)
jtiNoUnique token ID for replay protection

The returnTo Parameter

Tightknit uses the returnTo parameter to preserve the userโ€™s original URL after authentication. For example, if the user was on the /dashboard page before authentication, the returnTo parameter will have the value /dashboard.
{callback-url}?returnTo=/dashboard
The returnTo parameter must be a relative path starting with /. Absolute URLs are rejected for security.

Provider-Specific Guides

Google Workspace

  1. Go to Google Cloud Console > APIs & Credentials
  2. Create OAuth 2.0 Client ID (Web application)
  3. Set the redirect URI provided by Tightknit
  4. Endpoints to share with Tightknit:
    • Issuer: https://accounts.google.com
    • Discovery: https://accounts.google.com/.well-known/openid-configuration

Microsoft Azure AD

  1. Go to Azure Portal > App registrations
  2. Create new registration (Web application)
  3. Set the redirect URI provided by Tightknit
  4. Create a client secret under Certificates & secrets
  5. Endpoints to share with Tightknit:
    • Issuer: https://login.microsoftonline.com/{tenant-id}/v2.0
    • Discovery: https://login.microsoftonline.com/{tenant-id}/v2.0/.well-known/openid-configuration

Okta

  1. Go to Okta Admin Console > Applications
  2. Create App Integration > OIDC > Web Application
  3. Set the redirect URI provided by Tightknit
  4. Endpoints to share with Tightknit:
    • Issuer: https://your-org.okta.com
    • Discovery: https://your-org.okta.com/.well-known/openid-configuration

Auth0

  1. Go to Auth0 Dashboard > Applications
  2. Create Application > Regular Web Application
  3. Set the callback URL provided by Tightknit
  4. Endpoints to share with Tightknit:
    • Issuer: https://your-tenant.auth0.com/
    • Discovery: https://your-tenant.auth0.com/.well-known/openid-configuration

Security Best Practices

For Administrators

  • Restrict redirect URIs - Only allow the exact Tightknit callback URL
  • Enable MFA - Require multi-factor authentication at your IdP
  • Audit SSO access - Review SSO login logs regularly
  • Rotate secrets - Change client secrets periodically

For Token-Based SSO

  • Use short-lived tokens - Set exp to 5 minutes or less
  • Include jti claims - Enable replay protection
  • Use JWKS - Prefer dynamic key management over static keys
  • Use HTTPS - All SSO endpoints require secure connections

Troubleshooting

โ€Provider not foundโ€ error

The SSO provider is not configured. Contact [email protected].

โ€Invalid redirect URIโ€ error

The redirect URI in your IdP doesnโ€™t match. Verify it exactly matches the URL provided by Tightknit during setup.

โ€Authentication failedโ€ error

  1. Verify client ID and secret are correct
  2. Check IdP is accessible from the internet
  3. Ensure required scopes are granted

โ€No profile foundโ€ error

The userโ€™s email doesnโ€™t match any existing profile in your Tightknit tenant. Users must have a profile before they can sign in via SSO.

Token SSO errors

ErrorCauseFix
invalid_tokenJWT signature verification failedCheck public key/JWKS configuration
token_expiredJWT exp claim is in the pastIssue a new token with valid expiration
invalid_issueriss claim doesnโ€™t match configurationVerify issuer matches exactly
invalid_audienceaud claim doesnโ€™t match configurationVerify audience matches exactly

Getting Help

For SSO setup assistance, contact [email protected] with:
  • Your identity provider type
  • Your company email domain
  • Error messages or screenshots (if troubleshooting)