Authentication & SSO

Single Sign-On (SSO) lets your team log into CARTO using their existing work credentials – no separate passwords to remember. SSO is recommended for organizations with more than 10 users due to several key benefits:

  • Improves security by using your company's existing security policies (like multi-factor authentication) and automatically removes CARTO access when employees leave

  • Gives IT control over who can access CARTO at any time

  • Simplifies user management with a custom login URL and automatic user provisioning

  • Unlocks advanced features like Groups for better sharing and collaboration

SSO integrations are only available for Enterprise Medium plans and above. Please get in touch at [email protected] if you’re interested in this feature.

Setting up SSO

SSO integrations are handled by our Support Team and typically take around 1-2 days after the exchange of some basic information. In your request, please specify your Identity Provider (e.g., Okta) and the Authentication Protocol (e.g., SAML) you wish to use.

CARTO uses Auth0 as the Service Provider. Use this information to preemptively gather the relevant information and speed up the process.

Supported Authentication Protocols

CARTO supports SSO integrations using the following protocols:

  • SAML 2.0 (Recommended)

  • OpenID Connect (OIDC)

  • LDAP

  • WS-Fed

  • OAuth 2.0

Supported Identity Providers

Most Identity Providers (IdPs) support at least one of these protocols, so if your Identity Provider is not in the following list, it should be supported as well. These are some of the most common services that can be set up as the SSO Identity Provider:

  • Okta

  • Azure Active Directory

  • Google Workspace

  • Salesforce

  • OneLogin

  • Auth0

  • PingForce

  • Many more...

SSO Groups

CARTO has the ability to read the groups attribute coming from your IdP to synchronize groups in CARTO. These groups can then be used to share maps and other assets with groups of users and manage user roles automatically.

Our Support Team will guide you through the process of setting up SSO Groups in CARTO. If you require this feature, please mention it in your request.

Groups are only available for Enterprise Large plans and above. Please get in touch at [email protected] if you’re interested in this feature.

Managing users in organizations with SSO

After setting up SSO, your team can log in using SSO in two ways:

  1. SSO URL: This URL is available in the settings and is unique to your organization. Opening it will redirect you to your SSO login.

  2. SSO Discovery: In the CARTO login page, click on Login with SSO and type in your organization name. You will be redirected to your SSO login.

Users joining the organization through Single Sign-On will have the Default role set in the Users & Groups settings. For more information, read Managing user roles.

SSO Discovery page. After typing the name of your organization you will be taken directly to your SSO login page.

Just-in-time provisioning

In the standard CARTO signup process, new users are required to complete a form with basic details such as their name, role, contact details, etc.

However, for organizations using SSO, this step can be bypassed with Just-in-Time (JIT) provisioning. When JIT is enabled, new users who access CARTO using their SSO credentials for the first time are automatically signed up, eliminating the need to provide any additional details.

To activate JIT Provisioning, simply navigate to the Authentication and SSO section in the Settings and activate the Enable Just-in-time provisioning toggle.

Enforcing SSO

Admins can choose to enforce SSO within their organization. When enabled, users that try to authenticate with other mechanisms, such as User/Password and Google Account will not be allowed to log in.

To enforce SSO, activate the Enforce Single Sign-On as the only authentication method toggle in the Authentication & SSO settings.

When enforcing SSO, non-SSO users will remain in the organization with their assets intact. But they won't be able to log in as long as SSO is being enforced.

Last updated

Was this helpful?