SSO
SCIM/Provisioning
Login Logic
Domains
Errors & Edge Cases
100

SSO controls this experience for the end user

“Authentication” or “Login”

100

SCIM allows admins to automatically do this during the workspace set up process

Provision seats/invite users

100

Even if a user successfully authenticates with their IdP, their login will fail if this condition isn’t met.

Membership in an authorized workspace or organization

100

Before SSO can be configured in a workspace or org, this process must be completed to prove domain ownership.

Domain Verification

100

A common cause of one user appearing as two distinct users in a workspace

1. User changed email address

2. Domain migration

200

The shared unique identifier between ChatGPT and API Platform which is used for authentication

Org-ID

200

True or False: You must have SSO enabled to use SCIM provisioning.

FALSE

200

When enabled, this setting blocks users with a verified domain from logging in with password or social methods.What is Enforce SSO?

Enforce SSO

200
Once a domain is claimed, personal accounts under a verified domain has this toggled off  

Training on data

200

A common cause of one user appearing as two distinct users in a workspace

1. User changed email address

2. Domain migration

300

The page admins use to set up SSO in ChatGPT or the API Platform

Identity page

300

Explanation to the question "Where did these new users come from? I didn't invite them!"

AAC (automatic account creation) is enabled

300

Reason a Personal/Plus account is automatically merged into the Enterprise workspace upon login even though user didn't receive an invite email

AAC is enabled

300

This is the reason you must verify engineering.company.com separately from company.com.

 subdomains must be verified independently

300

Can cause user's names to show up as email addresses when missing or mismatched

Attribute Mappings

400

An SSO scenario we do not easily support
HINT: IDP / DOMAIN

Multiple IDPs, single domain

400

When this feature flag is enabled, SCIM should be disabled as a best practice.

Automatic Account Creation

400

A user’s email was recently changed in their IdP (e.g., due to marriage or acquisition), but they can’t log in to OpenAI despite successful IdP authentication. Why?

The user’s old SAML profile in Auth0 is still mapped to their original email, and needs to be disassociated manually?

400

A requirement for enabling Domain Claiming

-70% knowledge workers purchased
-Regulated industry (ie FINRA or HIPAA)
-Commitment to enroll all existing personal users into Enterprise workspace

400

If a user logs in with SSO but sees their email used as their display name, it’s likely because this is missing from the SAML assertion.

What are the given_name and family_name attributes?

500

Reason a user may not be able to use Google or Apple to sign in anymore

SSO is enabled and enforced

500

Reason user may not be provisioned through SCIM despite being a part of the provisioning group in the idP.

Already exists in OpenAI via AAC or manual invite (SCIM skips existing users).

500

Verifying a domain in one Platform org will force SSO for all users with that domain across Platform, because Platform SSO is enforced at this level.

the domain level

500

This technical problem usually explains why OpenAI can’t read attributes from an otherwise valid SAML assertion.

encrypted assertions (which are not supported)