Available guides
Okta SAML
Create an Okta SAML app, collect the required metadata, and send it to CodeRabbit to enable Enterprise SSO.
Setup flow
Request CodeRabbit service provider values
Contact support@coderabbit.ai to obtain the values your identity provider needs for the SSO application:
- Single sign-on URL (ACS URL)
- Audience URI (SP Entity ID)
Configure your identity provider
Create a new SSO application in your identity provider and enter the CodeRabbit service provider values. The provider-specific guide will tell you which fields to populate and how to format the login attributes.
Send your identity provider metadata to CodeRabbit
After the application is created, collect your identity provider metadata and send it to CodeRabbit. For SAML-based providers, this typically includes your organization’s email domain, Sign-on URL, issuer, and X.509 signing certificate.
Assign users or groups
Grant access to the users or groups who should be able to sign in to CodeRabbit. Users cannot complete SSO login until they are assigned to the application in your identity provider.
What’s next
Subscription management
Manage billing, plan details, and seat settings as part of your Enterprise rollout.
Roles and permissions
Review how CodeRabbit roles work so you can combine SSO with the right access model for your organization.
Support
Contact the CodeRabbit team if you need your service provider values or help troubleshooting the rollout.