nao Enterprise supports single sign-on (SSO) so your users sign in to nao with the same identity provider they already use for the rest of your stack. SSO is gated by theDocumentation Index
Fetch the complete documentation index at: https://docs.getnao.io/llms.txt
Use this file to discover all available pages before exploring further.
sso feature flag on your Enterprise license - install the license first (see Overview).
Microsoft SSO (Azure AD / Entra ID)
Microsoft SSO is implemented via OAuth against Azure AD (Entra ID). When configured, the nao login page exposes a Sign in with Microsoft button, and new users are auto-provisioned the first time they sign in (subject to your auto-create policy).Step 1: Register an application in Azure
- Open the Azure portal -> Microsoft Entra ID -> App registrations.
- Click New registration. Give it a name (e.g.
nao SSO). - Supported account types: pick Single tenant unless you need cross-tenant access.
- Redirect URI: type Web, value
https://<your-nao-deployment>/api/auth/callback/microsoft. - Click Register.
Step 2: Create a client secret
- In your new app, open Certificates & secrets -> Client secrets -> New client secret.
- Pick an expiry that matches your rotation policy.
- Copy the Value immediately - it is only shown once.
Step 3: Configure API permissions
- Open API permissions -> Add a permission -> Microsoft Graph -> Delegated permissions.
- Add
openid,profile,email,offline_access. - If you plan to use Redshift RLS via Entra ID, also expose your Redshift API scope under Expose an API and add it here.
- If your tenant requires it, click Grant admin consent.
Step 4: Configure nao
Set the following environment variables on your nao deployment and restart:sso feature active, the Sign in with Microsoft button appears on the login page.
Step 5: Verify
- Open your nao deployment’s login page in a private window.
- Click Sign in with Microsoft and complete the Microsoft prompt.
- You should land in nao with a user account provisioned from your Microsoft identity (email + display name).
- As an admin, open Settings -> Team to confirm the user appears with the role you expected.
The Microsoft refresh token issued at sign-in is stored encrypted by nao and reused to silently obtain access tokens for downstream services like Redshift. Users do not have to re-authenticate when they query the warehouse.
Mapping Microsoft groups to nao roles
Group-to-role mapping is not yet exposed in the UI. Today, nao auto-provisions new SSO users with the Member role. Promote users to Admin or demote them to Viewer from Settings -> Team. For automated mapping, contact us - the rules go through the license payload.Okta SSO
Coming soon. We’re tracking Okta SAML / OIDC support in our roadmap. If your team needs Okta now, email claire@getnao.io - we can scope a custom rollout.Removing SSO
To disable SSO temporarily, unsetAZURE_AD_CLIENT_ID (or remove the license). The login page falls back to email + password authentication. Existing SSO users retain their accounts and can be migrated to email + password from Settings -> Team.