Google SSO
LILT platform users can sign in using their Google account. After receiving an invitation from your organization, you can create an account using Google Sign-On. If you have an existing LILT account with traditional username/password authentication, you can access it using Google Sign-On with a matching email address. Both sign-in methods work interchangeably.OpenID Connect
OpenID SSO for platform customers is coming in 2025. This feature will enable sign-in through your organization’s SSO using OpenID Connect (OIDC). OpenID Connect is an authentication protocol built on OAuth 2.0 (IETF RFC 6749 and 6750). It provides a standardized way to verify user identity through an Authorization Server and obtain user profile information. OIDC works with many identity providers including Amazon, Microsoft, and Okta.Microsoft SSO
LILT supports Microsoft authentication for platform customers. Organizations using Active Directory or Azure credentials can use their existing SSO for LILT. To set up Microsoft SSO, a user from your organization needs to:- Log into LILT.com using Microsoft SSO
- Complete the consent page
Enterprise applications in your Azure Active Directory (AD) or Azure Entra ID, where you can configure access controls.
Restricting Access
To limit access to specific users:- Click on the LILT app in Enterprise applications and navigate to Manage > Properties
-
Set
Assignment requiredto Yes

-
Add users under Manage > Users and Groups
- Grant access to entire roles, or
- Add individual users

SAML Setup
To set up a SAML connection with LILT, your organization needs to engage with your LILT customer team. The setup process involves: LILT Actions- LILT creates a new organization configuration with a specific identifier (for example:
customer:okta)- You can choose any name in place of
customer:okta. This acts as a verification piece to ensure you’re connecting to the correct configuration.
- You can choose any name in place of
- Set up SAML configuration on your organization’s side and provide the following to LILT:
- The sign-on URL for your application
- The entity ID for your application
- The metadata file for your application
- The certificate for your application
- New user accounts will be provisioned automatically through just-in-time provisioning when users first log in through SAML
- Configure two custom claims in your organization’s identity provider:
Required Claims for JIT Provisioning
Both of the following claims are required for automatic user provisioning:lilt_api- Your organization’s API key for organization identification- This claim is only required for new users being provisioned through JIT. Existing LILT users can authenticate via SSO without this claim.
- To find your API key:
- Log into lilt.com using a non-SSO admin account
- Click the gear icon in the lower left corner
- Navigate to the API tab
- Copy your API key value
- Warning: Do not log into your admin account via SSO, as this will convert it to SSO-only and you will lose access via the regular login page.
lilt_role- The user’s role for permissions within LILT- This value must exactly match an existing role name in LILT (for example:
Administrator,Manager, or your organization’s standard access role) - This can be configured as either:
- An individual user attribute in your IdP, or
- A custom group claim (recommended if most users should have the same role)
- Important: This attribute will override any manual role changes in LILT whenever the user logs in via SSO
- This value must exactly match an existing role name in LILT (for example:
Technical Configuration Details
When setting up your SAML claims, ensure:- The
emailaddressclaim should not have a namespace value configured - LILT uses email addresses as usernames in the system
- If your IdP’s
user.mailattribute is not consistently populated, you can useuser.userprincipalnameinstead (provided it’s formatted as an email address) - The
lilt_roleattribute value is case-sensitive and must exactly match a role that exists in your LILT organization - We recommend a phased rollout approach, starting with your admin and 5 test users before migrating all users to the new SSO experience
OpenID Connect (OIDC) Setup
LILT is expanding SSO support to include OpenID Connect (OIDC) in addition to SAML. This provides more flexibility for organizations using different identity providers. Note: LILT currently supports SAML configuration. OIDC support is being added and will be available soon.Set SSO Users’ Domains on Account Creation
Many enterprises have multiple teams using LILT, each with a unique set of needs. To support this, our Domains feature allows administrators to segment their workflows by assigning resources—such as users, models, and preferences—to specific domains. You can read more about this feature under Domains. This section explains how to configure automatic domain assignment for users via OIDC claims during SSO authentication. Supported Identity Providers- WSO2 Identity Server (WSO2 IS)
- Asgardeo
- Any OIDC-compliant identity provider that supports custom claims
Claim Configuration
To utilize this feature, you must configure thelilt_domains claim within your Identity Provider (IdP).
Claim Name
lilt_domains
Claim Format
The claim supports multiple formats to accommodate different user store configurations:
| Format | Example | Description |
|---|---|---|
| Single value | "Marketing" | Assign user to one domain |
| Comma-separated | "Marketing,Sales,Legal" | Assign user to multiple domains |
| JSON array | ["Marketing", "Sales"] | Assign user to multiple domains |
| Domain ID | "123" | Reference domain by numeric ID |
| Mixed | "Marketing,456,Sales" | Combine names and IDs |
lilt_domains claim must be included in the profile scope (or a custom scope that is requested during the authentication process).
Identity Provider Setup
WSO2 Identity Server / Asgardeo
- Create the claim
- Navigate to Claims > Add Local Claim
- Claim URI:
http://wso2.org/claims/lilt_domains - Display Name:
LILT Domains - Mapped Attribute: Configure this based on your specific user store
- Add to OIDC scope
- Navigate to OIDC Scopes > profile (or create a custom scope)
- Add the
lilt_domainsclaim to the scope
- Map to OIDC claim
- Navigate to Claims > Add External Claim.
- Dialect:
http://wso2.org/oidc/claim. - External Claim URI:
lilt_domains. - Mapped Local Claim: Select the local claim created in Step 1.
- Assign values to users
- Edit user profiles to manually set the
lilt_domainsattribute. - Alternatively, configure attribute mapping from your user directory (such as LDAP or AD).
- Edit user profiles to manually set the
Domain Resolution
When a user authenticates, LILT resolves domains in the following order:- Numeric values (e.g.,
"123") are treated as domain IDs. - Non-numeric values (e.g.,
"Marketing") are treated as domain names.
lilt_domains claim. If a domain is named "123", specifying "123" in the claim will attempt to find a domain with ID 123, not a domain named “123”.
- Workaround: Rename such domains to include at least one non-numeric character (e.g.,
"123-dept"or"Dept 123").
Behavior
On User Login When a user authenticates with alilt_domains claim:
- LILT parses the claim value into individual domain identifiers
- Each identifier is resolved to a domain within the user’s organization
- The user is assigned to all successfully resolved domains
- Domains that cannot be found are logged but do not cause authentication failure
- Users are added to the specified domains
- Existing domain assignments are preserved
- The claim does not remove users from domains not listed
Related Claims
| Claim | Purpose |
|---|---|
lilt_role | Assign user to a specific role |
lilt_api | Associate user with an API key (determines organization) |
lilt_domains | Assign user to domains |
Troubleshooting
JIT Provisioning Is Not Working
If new users cannot log in or are not being automatically provisioned:- Verify both required claims are configured in your IdP:
lilt_apimust contain your organization’s API keylilt_rolemust contain a value that exactly matches a role name in LILT
- Check for common configuration issues:
- The
emailaddressclaim should not have a namespace configured - The
lilt_rolevalue is case-sensitive and must match exactly - Ensure users are accessing the SSO login at
/signin2, not the regular login at/signin
- The
- Confirm existing vs. new user behavior:
- Existing LILT users can authenticate via SSO even without the
lilt_apiclaim - New users require both
lilt_apiandlilt_roleclaims for JIT provisioning
- Existing LILT users can authenticate via SSO even without the
Users Are Locked Out After SSO Setup
If admin users lose access to their accounts:- Admin accounts that log in via SSO are automatically converted to SSO-only
- Once converted, these accounts can only access LILT through
/signin2(SSO), not/signin(regular login) - To avoid this, maintain a separate non-SSO admin account for configuration purposes
Domains Are Not Being Assigned
If users are not being assigned to domains as expected, check the following:- Verify the claim is in the token
- Check your IdP’s token preview or debug feature
- Ensure
lilt_domainsappears in the userinfo response
- Verify scope configuration
- The claim must be included in a scope requested during authentication
- Typically, this is the
profilescope
- Check domain exists
- The domain must exist in the user’s organization
- Domain names are case-sensitive
- Check for numeric name conflict
- If using a numeric domain name, rename it to include non-numeric characters
Logging
Domain assignment events are logged with the componentembedded-oidc. Look for the following entries:
"embedded-oidc: Domain not found for lilt_domains claim"Indicates the domain could not be resolved."embedded-oidc: Assigned user to domains"Indicates successful assignment
Frequently Asked Questions
Is SCIM supported? Currently, SCIM is not supported. Auto-provisioning is handled through the two custom claims/attributes (lilt_api and lilt_role) listed in the SAML configuration section. If JIT provisioning is not working:
- Verify both claims are present in your SAML configuration
- Confirm the
lilt_rolevalue exactly matches an existing role in LILT - Ensure the
lilt_apicontains your organization’s valid API key
- Regular logins via
/signin - SSO logins via
/signin2
/signin2, then tries to log in as a regular user, the system will deny entry and require SSO login.
For organization-wide SSO implementation, auto-provisioning works as follows:
- If a user doesn’t exist in the LILT database, they’ll be automatically added when they first log in via SSO
- The user’s SAML assertion must include the
lilt_apiclaim with your organization’s API key (to identify which organization to add them to) - The user’s SAML assertion must include the
lilt_roleclaim with a value that exactly matches an existing role in LILT (to assign appropriate permissions) - If either claim is missing or incorrectly configured, JIT provisioning will fail
- Once configured this way, users can only log in via
/signin2(SSO), not via/signin(regular login) - Your organization won’t need to manually add users to the LILT system

