Skip to content

Set Up Single Sign-On (SSO) with Monta

Monta supports Single Sign-On using OpenID Connect (OIDC), enabling users to sign in with their existing corporate identity provider while benefiting from centralized authentication and improved security.

Profile picture of Damian Pupczyk
Written by Damian Pupczyk
Last updated 22 December, 2025

Monta supports Single Sign-On using OpenID Connect (OIDC), allowing operators to authenticate users through their existing OAuth 2.0 Identity Providers (IdPs) such as Microsoft Azure AD, Google, Auth0, and others that follow the OIDC standard.

Why Use SSO with Monta?

SSO improves your organization’s security and simplifies user management by centralizing authentication.

Key benefits include:

  • Enhanced security – Centralized control and MFA enforcement.
  • Streamlined user access – Users log in once to access Monta and other company apps.
  • Simplified administration – Add or remove users directly through your IdP.
  • Enterprise readiness – SSO is a core requirement for larger teams and partners.

Supported Providers

Monta currently supports OIDC-based IdPs, including:

  • Microsoft Entra ID (Azure AD)
  • Okta
  • Google Workspace
  • OneLogin
  • Auth0

Set Up OIDC SSO in Monta

1. Configure Your OpenID Connect Provider

Add the following redirect URI to your IdP configuration:

Redirect URI:

https://app.monta.app/identity/kratos/self-service/methods/oidc/callback/{PROVIDER_ID}

Replace {PROVIDER_ID} with your operator identifier.

2. Provide Configuration Details to Monta

To complete the setup, send the following information to your Monta representative:

FieldDescription
Provider typeMicrosoft, Google, Auth0, or any OIDC-compliant provider
Issuer URLBase URL used to resolve IdP metadata
Tenant IDRequired for Microsoft Azure AD only
Client IDPublic identifier for the application
Client secretSecret shared between the IdP and Monta
Email domainsDomains linked to this IdP configuration. Users from these domains:
• Can auto-select the correct IdP on the login page
• Will be restricted to SSO-only login by default.
Contact Monta if dual login (SSO + email/password) is required

First-Time SSO Login

If a user already has a Monta account with a corporate email address, they must sign in once using their existing login method (email/password, SMS, etc.).

Monta will link their new OIDC identity to the existing account.

Session Lifetimes

Default values:

  • Session lifetime: 30 days
  • Inactive session timeout: 1 day

These can be customized per operator by contacting Monta.

Role Mapping (Just-in-Time Role Syncing)

Monta can read role information from the IdP-issued ID token and apply Monta roles automatically at each SSO login.

  • Roles update every time a user signs in through SSO
  • Requires coordination with Monta to configure role claims and mappings

Contact Monta to enable and configure this feature.

Troubleshooting

IssuePossible CauseSolution
MFA prompts not showingNot enforced in IdPEnable MFA policies directly in your IdP.
Role mismatchIncorrect claims mappingEnsure role claims (e.g., groups or role) are configured correctly in the IdP.
Token errorsInvalid or expired secretRegenerate the client secret in your IdP and update Monta.
Need to talk to a specialist?

Contact our support team

Platform status:
All Systems Operational

Private users

Start a chat in the Monta app on your mobile device of choice.
Open Monta app
Open hours: 24/7, 365
First reply time: < 5 minutes

Business customers

Sign in to Monta Hub and create a support ticket.
Sign in
Open hours: 07:00 - 23:00 CET
First reply time: < 3 business days

Certified installers

If you're a certified installer, you can book a guided call with a Monta integration specialist.
Book integration call
Open: Mon - Fri 09:00 - 17:00 CET