Documentation Index
Fetch the complete documentation index at: https://docs.getomni.co/llms.txt
Use this file to discover all available pages before exploring further.
Google OAuth is supported in the community edition and does not require a commercial license. Configure it from Settings → Authentication in the admin panel.
Overview
Omni supports Single Sign-On via Google OAuth (community), Okta, and Microsoft Entra ID. Once SSO is configured, you can optionally disable password-based authentication. All SSO provider configurations — including client secrets — are stored encrypted in the database and managed through the admin UI, not environment variables.Enterprise Prerequisites
- An Okta or Entra ID admin account with permission to create applications
- A commercial Omni license (or evaluation with fewer than 10 users)
- Omni deployment using the
omni-web-enterpriseDocker image
Enable Enterprise SSO
Step 1: Switch to the Enterprise Image
Replace theomni-web Docker image with omni-web-enterprise in your docker-compose.yml:
null for.
Step 2: Create an Okta Application
- Log in to your Okta Admin Console
- Go to Applications → Create App Integration
- Select OIDC - OpenID Connect and Web Application
- Configure the application:
- App integration name: Omni
- Sign-in redirect URI:
https://<your-omni-domain>/auth/okta/callback - Sign-out redirect URI:
https://<your-omni-domain>
- Under Assignments, assign the app to the users or groups who should have access
- Save the application
- Note the Client ID and Client Secret from the application settings
Step 3: Configure Okta in Omni
- Navigate to Settings → Authentication in the Omni admin panel
- Under Okta SSO, enter:
- Okta Domain: Your Okta domain (e.g.,
yourcompany.okta.com) - Client ID: From Step 2
- Client Secret: From Step 2
- Okta Domain: Your Okta domain (e.g.,
- Click Save
SSO is now configured. Users will see a “Sign in with Okta” option on the login page.
Microsoft Entra ID
Entra ID (formerly Azure AD) is configured the same way as Okta — register an application, add a client secret, and enter the tenant ID, client ID, and client secret in Settings → Authentication → Microsoft Entra ID.Step 1: Register an Enterprise Application in Entra ID
- Sign in to the Azure Portal as a Global Administrator
- Go to Microsoft Entra ID → App registrations → New registration
- Set the name: Omni SSO
- Supported account types: Single tenant
- Redirect URI: Web →
https://<your-omni-domain>/auth/entra/callback - Click Register
- Note the Application (client) ID and Directory (tenant) ID
Step 2: Create a Client Secret
- Go to Certificates & secrets → New client secret
- Set an expiry period and click Add
- Copy the secret value immediately — it will not be shown again
Step 3: Configure Entra ID in Omni
- Navigate to Settings → Authentication
- Under Microsoft Entra ID, enter the Tenant ID, Client ID, and Client Secret
- Click Save
Disabling Password Authentication
Once at least one SSO provider is active, you can disable password-based login:- Navigate to Settings → Authentication
- Toggle off Password Authentication