Cintoo SSO Implementation Guide

Created by Cyril Deguet, Modified on Tue, 19 Mar 2024 at 05:37 PM by Cyril Deguet




Cintoo Cloud can be integrated with your corporate Single Sign-On (SSO) solution, in order to fulfill corporate security requirements and simplify user management.

Cintoo Cloud supports OpenID Connect (OIDC) and SAML protocols, and is known to work with the following identity providers:

  • Azure AD (preferred provider)
  • Microsoft ADFS
  • Okta / Okta MyID
  • Ping Federate

Contact your Cintoo sales representative or to subscribe to the SSO option for your Cintoo account.

Authentication flow


Authentication in Cintoo Cloud is done in two steps:

  • Enter the login (e-mail address).
  • Depending on the domain name (second part of the e-mail after the @ character), redirect to either Cintoo native authentication screen (i.e. with a Cintoo login and password), or to the corporate SSO login screen.

This means that once SSO is activated for the domain, any user with a login of the form is redirected to the corresponding identity provider login screen, and there is no way to fall back to the native Cintoo authentication.

Note: customers who subscribed to a custom Cintoo Cloud domain (of the form can ask to use their own SSO provider for all users, independently of the user’s domain name. See section about External Users below.


User provisioning


SSO is only used for authentication and has no impact on the way users are created in your Cintoo account. Users still have to be invited by an account administrator, or by a project / BIM manager. 

Any user trying to authenticate using SSO without being invited first in the account will get the following error message after the SSO step:

Une image contenant texte

Description générée automatiquement



External users


If you invite external users (i.e. with an email in a domain you don’t control) to your projects, by default these users will not authenticate with your SSO, as the SSO is configured per domain name.


  • Your company domain name is
  • You invite to one of your projects
  • If is also a Cintoo Cloud customer and subscribed to the SSO option, then will authenticate through SSO ( SSO). Otherwise this user will log in through the native Cintoo cloud authentication.

To increase control over your external users, you may want to:

  • Add all external users as guests in your own user directory (e.g.
  • Subscribe to a custom Cintoo Cloud domain, i.e. (contact Cintoo sales for information). This way you will get your own Cintoo Cloud tenant, and all your projects will only be accessible through
  • Ask Cintoo IT team to link your custom domain with your SSO provider. This means that any user trying to open a project in will be redirected to your own SSO, even if they don’t have a email address.


SSO implementation process


An SSO implementation always follows these steps:

  • Contact Cintoo sales to subscribe to the option
  • Configure your identity provider with OIDC or SAML, and communicate the required information to Cintoo IT team via (see details below)
  • Validate the SSO configuration with a few users, using a temporary login URL
  • Agree with Cintoo IT team about a cutover date, after which all users in your domain will be redirected to your SSO login screen

Note that users created in Cintoo Cloud prior to the cutover will not be able to connect anymore with their existing Cintoo password.



Identity Provider configuration


OpenID Connect


Azure AD is the easiest way to implement Cintoo Cloud SSO with OpenID Connect.

Cintoo Cloud is registered in the Azure AD app gallery (using OpenID Connect), which makes the configuration very simple on your side.

You don’t need to create manually any application in your Azure AD tenant, nor to add manually the "Cintoo Cloud" application from Azure AD app gallery

The application will be added automatically the first time a user in your domain tries to authenticate on Cintoo Cloud using Azure AD (using the temporary login URL provided by Cintoo support).

However, depending on the Azure AD tenant configuration, approval from an Azure AD admin may be required:

Une image contenant texte

Description générée automatiquement

In that case, the login URL should be sent to an Azure AD admin for approval.

Azure AD using a custom application


If you don’t want to or cannot provision the generic Cintoo Cloud application provided in the Azure AD app gallery, you still have the option to create your own application in Azure AD.

In Azure AD, select “App registrations” then “New registration”:

Une image contenant texte

Description générée automatiquement

Important: the domain in the redirect URI has to match the domain of your Cintoo Cloud instance (e.g.,,

Once the application is created, edit the Authentication settings and enable the “ID tokens” option:

Une image contenant texte, capture d’écran, moniteur, écran

Description générée automatiquement

Note the Application (client) ID and the Directory (tenant) ID of the application and communicate these values to Cintoo IT team:

Une image contenant texte, capture d’écran, moniteur, écran

Description générée automatiquement

ImportantCintoo Cloud tries to match the user based on its email address. If the upn field of your Azure AD users doesn't contain the email address, you need to configure an optional email claim containing the user's email address (in that case Cintoo Cloud will look at the email field in the OAuth reply instead of upn).

Here is how to add this optional claim:

You also need to add an API permission for Microsoft Graph to read the email address:



In Okta administration, create a new app:

Une image contenant texte

Description générée automatiquement

Select Web / OpenID Connect:

Une image contenant texte

Description générée automatiquement

Add the needed redirect URL:

Une image contenant texte

Description générée automatiquement


The redirect URI depends on the domain name of your Cintoo Cloud instance. Check with Cintoo IT team what is the correct one.

In the next screen, “General Settings”, click Edit and add the “ID Token with implicit grant” permission:

Une image contenant texte

Description générée automatiquement

When it’s done go to “Sign On” tab and note the “Issuer” and “Audience” fields in the “OpenID Connect ID Token” section.


These values will have to be communicated to Cintoo IT team.


Other providers


Here is the generic configuration for any other identity provider using OpenID Connect:

  • Create a “Cintoo Cloud” application
  • Configure the redirect URI: https://<domain>/login/oauthcb where domain depends on your Cintoo Cloud instance (e.g. or
  • Allow ID token with implicit grant
  • Allow the following scopes: openid email profile
  • Communicate the following information to Cintoo IT team:
    1. Client ID
    2. OpenID Connect discovery URL (e.g. https://<your_domain>/.well-known/openid-configuration)

ImportantCintoo Cloud matches the user name based on the email field in the OAuth reply. If there is no email field, the upn field is used instead.




Here is the Service Provider Metadata you will need to configure your SAML identity provider:

<md:EntityDescriptor xmlns:md="urn:oasis:names:tc:SAML:2.0:metadata" entityID="https://<domain>/saml">
    <md:SPSSODescriptor AuthnRequestsSigned="false" WantAssertionsSigned="false" protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol">
        <md:AssertionConsumerService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="https://<domain>/saml" index="1"/>


Note that domain has to be replaced by the domain name corresponding to your instance of Cintoo Cloud (e.g.,, or

You will need to communicate your IdP metadata URL of file to Cintoo IT team, or at least the following details:

  • IDP entity ID
  • Login URL
  • Signing certificate(s)

ImportantCintoo Cloud matches the user name based on the NameID field (SAML subject) in the SAML response. The NameID has to be same as the Cintoo login, i.e. the user’s email address.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select atleast one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article