CodeWallDocs
Settings

Authentication (SSO)

Configure OIDC or SAML single sign-on for your organization.

CodeWall supports enterprise SSO via OIDC or SAML, allowing your team to sign in with your existing identity provider.

Supported protocols

OIDC (OpenID Connect)

FieldDescription
Display nameName shown on the SSO login button
Issuer URLYour IdP's OIDC issuer URL
Client IDThe client ID from your IdP
Client secretThe client secret from your IdP

SAML

FieldDescription
Display nameName shown on the SSO login button
IdP Entity IDYour identity provider's entity ID
IdP SSO URLThe SSO login URL from your IdP
IdP X.509 CertificateThe signing certificate from your IdP

Configuration options

JIT (Just-In-Time) provisioning

When enabled, users are automatically created in CodeWall on their first SSO login. You can set the default role for JIT-provisioned users:

  • Viewer — read-only access
  • Member — can create and manage tests
  • Admin — full access except billing

Enforce SSO

When enabled, all users in your organization must sign in via SSO. Password-based login is disabled.

Domain verification

Before enabling SSO, verify that you own your email domain:

  1. Go to Settings > Authentication
  2. Click Add Domain and enter your domain (e.g., acme.com)
  3. Add a DNS TXT record: _codewall-verification.acme.com = codewall-verify=<token>
  4. Click Verify once the DNS record propagates

Testing SSO

Use the Test button to verify your SSO configuration before enforcing it. This opens a test login flow without affecting existing users.