Single Sign-On (SSO)

LangWatch supports sign-in via various SSO providers. There are two ways to set up SSO:

1. Self-Hosted Deployment:

We’ve set up the following providers for you.
If you’d prefer a different provider, feel free to reach out to us at [email protected].
For a complete list of possible supported providers, please refer to the NextAuth.js documentation.

Azure AD/Entra ID

📄NextAuth Azure AD Provider Docs
ConfigurationValue
Required VariablesAZURE_AD_CLIENT_ID
AZURE_AD_CLIENT_SECRET
AZURE_AD_TENANT_ID
OAuth Redirect URL/api/auth/callback/azure-ad
Set NEXTAUTH_PROVIDER to azure-ad in your .env file.

Okta

📄 Okta Docs
ConfigurationValue
Required VariablesOKTA_CLIENT_ID
OKTA_CLIENT_SECRET
OKTA_ISSUER
OAuth Redirect URL/api/auth/callback/okta
Set NEXTAUTH_PROVIDER to okta in your .env file.

Auth0

📄 NextAuth Auth0 Provider Docs
ConfigurationValue
Required VariablesAUTH0_CLIENT_ID
AUTH0_CLIENT_SECRET
AUTH0_ISSUER
OAuth Redirect URL/api/auth/callback/auth0
Set NEXTAUTH_PROVIDER to auth0 in your .env file.

AWS Cognito

📄 NextAuth Cognito Provider Docs
ConfigurationValue
Required ENV VariablesAUTH_COGNITO_CLIENT_ID
AUTH_COGNITO_ISSUER
COGNITO_CLIENT_SECRET
OAuth Redirect URL/api/auth/callback/cognito
Set NEXTAUTH_PROVIDER to cognito in your .env file.

Google

📄 NextAuth Google Provider Docs
ConfigurationValue
Required VariablesAUTH_GOOGLE_CLIENT_ID
AUTH_GOOGLE_CLIENT_SECRET
OAuth Redirect URL/api/auth/callback/google
Set NEXTAUTH_PROVIDER to google in your .env file.

GitHub

📄 NextAuth GitHub Provider Docs
ConfigurationValue
Required ENV VariablesAUTH_GITHUB_CLIENT_ID
AUTH_GITHUB_CLIENT_SECRET
OAuth Redirect URL/api/auth/callback/github
Set NEXTAUTH_PROVIDER to github in your .env file.

GitLab

📄 NextAuth GitLab Provider Docs
ConfigurationValue
Required ENV VariablesAUTH_GITLAB_CLIENT_ID
AUTH_GITLAB_CLIENT_SECRET
Optional VariablesAUTH_GITLAB_ISSUER
AUTH_GITLAB_URL (For custom GitLab instances different from gitlab.com)
OAuth Redirect URL/api/auth/callback/gitlab
Set NEXTAUTH_PROVIDER to gitlab in your .env file.

2. Managed Service (app.langwatch.ai)

To use SSO with LangWatch SaaS, you can use the following providers:

Azure AD / Entra ID

📄 Azure AD Docs
ConfigurationValue
Required VariablesAUTH_AZURE_AD_CLIENT_ID
AUTH_AZURE_AD_CLIENT_SECRET
AUTH_AZURE_AD_TENANT_ID
Redirect URLhttps://langwatch.eu.auth0.com/login/callback

Google Workspace

📄 Google Docs
ConfigurationValue
Required VariablesAUTH_GOOGLE_CLIENT_ID
AUTH_GOOGLE_CLIENT_SECRET
Redirect URLhttps://langwatch.eu.auth0.com/login/callback

Azure AD / Entra ID

📄 Azure AD Docs
ConfigurationValue
Required VariablesAUTH_AZURE_AD_CLIENT_ID
AUTH_AZURE_AD_CLIENT_SECRET
AUTH_AZURE_AD_TENANT_ID
Redirect URLhttps://langwatch.eu.auth0.com/login/callback

Okta

📄 Okta Docs
ConfigurationValue
Required VariablesAUTH_OKTA_CLIENT_ID
AUTH_OKTA_CLIENT_SECRET
AUTH_OKTA_ISSUER
Redirect URLhttps://langwatch.eu.auth0.com/login/callback

Contact Us

Once you have all these details, please contact us so we can set them up from our side.

Support

For any queries or issues, feel free to reach out to us. We are available via:
  • Email: [email protected]
  • Slack: Connect with us directly on Slack for real-time support and assistance.

We look forward to helping you set up LangWatch seamlessly and efficiently.