This guide explains how to configure Enterprise SSO in FoxPlan for:
- SAML v2
- OIDC (OpenID Connect)
- Google (OIDC)
- Microsoft (OIDC / Azure AD)
Where to Configure SSO in FoxPlan #
SSO is configured per enterprise:
- Log in as an Enterprise Administrator.
- Go to Settings → FoxPlan Account.
- Open the Enterprise SSO tab.
- Click Add SSO configuration.
How Login Works #
On the login page, users enter their email and click Next. FoxPlan then:
- Finds the enterprise linked to the email.
- If multiple enterprises are found, the user selects one.
- Shows the available SSO options for that enterprise.
- If no enterprise SSO exists, standard login and default SSO options (Google/Microsoft/Atlassian) remain available.
1) OIDC (OpenID Connect) – Generic #
Use this for any OIDC‑compatible provider (Okta, Keycloak, Auth0, etc.).
Identity Provider (IdP) Setup #
- Create a new OIDC application (Web type).
- Set the redirect/callback URL to:
https://app.fox-plan.com/login/oauth2/code/{registrationId} - Save and copy the following values:
- Client ID
- Client Secret
- Issuer URI (OIDC discovery endpoint base)
FoxPlan Configuration #
- Provider: Custom OIDC
- Display name: e.g., “Sign in with Company SSO”
- Client ID / Client Secret
- Issuer URI (required)
- Scopes:
openid,profile,email - User name attribute:
sub(oremailif preferred) - Enable the configuration
Notes #
- OIDC endpoints (/authorize, /token, /userinfo, /keys) are automatically discovered from the Issuer URI.
- If your provider does not support discovery, use the “Advanced configuration” fields.
2) Google (OIDC) #
Google SSO uses standard OIDC.
Google Cloud Setup #
- In Google Cloud Console, create OAuth Client ID (Web).
- Authorized redirect URI:
https://app.fox-plan.com/login/oauth2/code/{registrationId} - Copy:
- Client ID
- Client Secret
FoxPlan Configuration #
- Provider: Google
- Display name: “Sign in with Google”
- Client ID / Client Secret
- Issuer URI:
https://accounts.google.com - Scopes:
openid,profile,email - User name attribute:
sub - Enable the configuration
3) Microsoft (OIDC / Azure AD) #
Microsoft SSO uses OIDC and Azure AD.
Azure AD Setup #
- Azure Portal → App registrations → New registration (Web).
- Redirect URI:
https://app.fox-plan.com/login/oauth2/code/{registrationId} - Copy:
- Client ID (Application ID)
- Client Secret
- Tenant ID (if using a specific tenant)
FoxPlan Configuration #
- Provider: Microsoft
- Display name: “Sign in with Microsoft”
- Client ID / Client Secret
- Issuer URI:
https://login.microsoftonline.com/{tenantId}/v2.0 - Scopes:
openid,profile,email - User name attribute:
sub - Enable the configuration
4) SAML v2 #
Use SAML when the IdP does not support OIDC or when your organization uses SAML policies.
IdP Setup #
- Create a new SAML application in your IdP.
- Set the ACS / Assertion Consumer Service URL:
https://app.fox-plan.com/login/saml2/sso/{registrationId} - Set the Audience / Entity ID (SP Entity ID):
https://app.fox-plan.com/saml2/service-provider-metadata/{registrationId} - Download or copy the IdP metadata (URL or XML), or the IdP SSO URL + certificate.
FoxPlan Configuration #
- Provider: SAML 2.0
- Display name: “Sign in with SAML”
- Entity ID (IdP Entity ID)
- Provide either:
- Metadata URL, or
- Metadata XML, or
- SSO URL + X.509 Certificate
- Binding: POST (recommended)
- Email / First name / Last name attributes (match IdP claims)
- Enable the configuration
Important Notes #
- registrationId format:
{enterpriseId}-{provider} - Each enterprise has its own SSO configuration and policies.
- MFA is enforced by your IdP, not by FoxPlan.
- If SSO is enabled for an enterprise, users will see it after entering their email on the login page.
Troubleshooting #
- Make sure the redirect URI matches exactly.
- Ensure the SSO configuration is enabled in FoxPlan.
- Check that the user email belongs to the correct enterprise.
- For SAML, verify metadata and certificate are correct and not expired.

