← Back to Cade

Sign in to Cade with Okta SSO

Last updated: May 1, 2026

Cade integrates with Okta via the Okta Integration Network (OIN) using OpenID Connect (OIDC). This guide walks an Okta administrator through installing the Cade application from the Okta App Catalog and configuring single sign-on for their organization.

By the end of this guide, your users will be able to sign in to Cade from their Okta dashboard or by visiting your tenant's sign-in URL directly.

Before you begin

You need:

Step 1 — Install Cade from the Okta App Catalog

  1. Sign in to your Okta Admin Console
  2. Go to Applications → Browse App Catalog
  3. Search for Cade
  4. Click Add Integration
  5. In the configuration wizard:
    • Application label — leave as "Cade" or rename to whatever your users will recognize
    • GetCade Tenant Slug — enter your tenant slug (the value from "Before you begin", for example acme)
  6. Click Done

Okta automatically configures the OIDC sign-in URLs using your tenant slug:

FieldValue (filled in automatically)
Sign-in redirect URIhttps://app.getcade.ai/t/{your-slug}/auth/okta/callback
Initiate login URIhttps://app.getcade.ai/t/{your-slug}/auth/okta/login

Step 2 — Assign users and groups

  1. In your Okta Admin Console, open Applications → Cade
  2. Click the Assignments tab
  3. Click Assign → Assign to People (or Assign to Groups for bulk assignment)
  4. Select the users or groups that should have access to Cade
  5. Click Save and Go Back, then Done

Assigned users will see the Cade tile on their Okta dashboard and can also navigate directly to https://app.getcade.ai/t/{your-slug}/auth/okta/login.

Step 3 — Test sign-in

To verify the integration:

  1. Open a private/incognito browser window
  2. Sign in to Okta as one of the users you assigned in Step 2
  3. From the Okta dashboard, click the Cade tile

You should be redirected through Okta and land in your Cade tenant, signed in as that user. The first sign-in for any user automatically creates their Cade account (Just-In-Time provisioning). The first user to sign in for a brand-new tenant becomes the tenant administrator; subsequent users default to the Analyst role.

You can also test the SP-initiated flow by visiting https://app.getcade.ai/t/{your-slug}/auth/okta/login directly — Okta will prompt you to sign in if you don't already have an active session.

Optional configuration

Restrict sign-in by email domain

If you want to restrict SSO to specific email domains (for example, only allow @acme.com addresses), contact Cade Support — domain restrictions are managed on the Cade side per tenant.

Disable Just-In-Time provisioning

By default, any Okta user assigned to Cade can sign in and have a Cade account created automatically on first sign-in. To disable this and require Cade accounts to be pre-created, contact Cade Support.

Default role for new users

New users provisioned via SSO are assigned the Analyst role by default. To change the default role for your tenant (for example, to Member or Admin), contact Cade Support.

Troubleshooting

"We couldn't sign you in" or you land back on the Cade login page

"Email domain not allowed"

"User not provisioned"

The Cade tile in your Okta dashboard goes to "Access Forbidden"

Security and privacy

Support

When contacting support about an SSO issue, include: