Factory provides comprehensive enterprise identity management through Single Sign-On (SSO) using SAML/OIDC protocols and automated user provisioning via Directory Sync (SCIM). This guide covers how these systems work together to manage user identities, authentication, and access control.Documentation Index
Fetch the complete documentation index at: https://factory-docs-auto-sync-jp-docs.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Overview
Factory uses WorkOS to handle enterprise identity management, supporting:- Domain Verification: Establish ownership of your email domains for identity governance
- SSO/SAML: Authenticate users through your Identity Provider (IdP)
- Directory Sync/SCIM: Automatically provision and manage users from your directory
- Just-In-Time (JIT) Provisioning: Create users on first login via SSO
- Group-based Access Control: Manage permissions through directory groups
How It Works
Domain Verification (Required First)
Before enabling SSO or Directory Sync:- Verify ownership of your email domains through DNS validation
- Claim existing users - All users with your domain automatically join your organization
- Set policies - Configure MFA, session management, and access controls
- Enable SSO/SCIM - Now ready for enterprise identity management
Authentication with SSO
When SSO is enabled:- Users click “Sign in with SSO” instead of entering a password
- They’re redirected to your corporate identity provider (Okta, Azure AD, etc.)
- After authenticating with their corporate credentials, they’re logged into Factory
- First-time users are automatically created if JIT provisioning is enabled
User Provisioning with Directory Sync
When Directory Sync (SCIM) is enabled:- Adding users to your directory automatically creates them in Factory
- Updating user information syncs to Factory in real-time
- Removing users from your directory revokes their Factory access
- Group changes automatically update user permissions
Data Priority
When users exist from multiple sources (SSO, Directory Sync, manual invite), Factory follows this priority:- Directory Sync data always wins - Information from your directory overwrites other sources
- Users are matched by email - We find existing users by email address (case-insensitive)
- Custom data is preserved - Factory-specific settings that don’t exist in your directory are kept
- Soft deletes - Removed users are deactivated, not deleted, preserving their work history
Prerequisites
Before setting up Domains, SSO, and SCIM:- You are on a plan that includes enterprise SSO support
- Your organization’s email domains must be verified (see Domain Verification below)
- You have admin access to your IdP (or a partner in IT who does)
- You have a Factory admin who can coordinate configuration on the Factory side
- Contact your Factory representative to initiate the setup process
Setup Process Overview
Initial Setup Flow
Contact Factory
Request SSO/SCIM setup from your Factory account representative or via
support@factory.ai
Receive Setup Link
You’ll receive a secure setup link (valid for 7 days) to configure your
identity provider
Verify Your Domains (Required)
Complete domain verification via DNS to establish ownership - SSO cannot be enabled without this step
Setup Options
During setup, you’ll configure:Connection Type
Connection Type
- SAML 2.0 - Recommended for enterprise IdPs - OIDC - Modern protocol with better mobile support - Both - Some providers support dual protocols
User Provisioning
User Provisioning
- Just-In-Time (JIT) - Users created on first login - Directory Sync (SCIM) - Automated provisioning from directory - Manual - Admin invites users individually - Hybrid - Combination of methods
Role Mapping
Role Mapping
- Attribute-based - Roles from SAML/OIDC claims - Group-based - Roles from directory groups - Default role - All users get same initial role - Custom mapping - Advanced rules engine
MFA Requirements
MFA Requirements
- IdP-enforced - MFA handled by your IdP - Factory-enforced - Additional MFA layer - Conditional - Based on user role or location - Optional - User choice
Domain Verification
Why Domain Verification Matters
Domain verification is a mandatory prerequisite for enabling SSO and establishing your organization’s identity governance in Factory. It proves your organization owns and controls specific email domains, creating a secure foundation for enterprise identity management.What Domain Verification Enables
Once your domain is verified, your organization gains powerful administrative controls:Identity Governance
- Mandatory SSO enforcement - Require all users with your domain to authenticate via SSO
- Automatic user claiming - Existing Factory users with your domain automatically join your organization
- Email domain restrictions - Prevent unauthorized accounts from using your domain
- Guest user policies - Define how external collaborators can access your organization
Security Policies
- MFA requirements - Enforce multi-factor authentication for all domain users
- Password policies - Set complexity requirements for non-SSO authentication methods
- Session management - Control session duration and idle timeout settings
- IP restrictions - Limit access to specific IP ranges or VPN endpoints
Compliance Controls
- Audit logging - Track all authentication events for domain users
- Data residency - Ensure user data stays within specified geographic regions
- Access reviews - Periodic certification of user access rights
- Deprovisioning workflows - Automated removal of access when users leave
Configuring Domain Verification
Domain verification is handled automatically through WorkOS. You have two options:
- Automatic Setup - Your Factory admin handles the entire process for you
- Self-Service Setup - Use the WorkOS dashboard to verify domains yourself
- Add domains to verify (e.g.,
yourcompany.com) - Receive a unique TXT record for DNS validation
- Add the record to your domain’s DNS settings
- WorkOS automatically detects and validates the record
- Configure domain policies once verified
What Happens After Verification
Once your domain is verified:- Immediate effect - All existing users with your domain email are associated with your organization
- Automatic claiming - New users with your domain join your organization by default
- Policy enforcement - Your configured security policies apply instantly
- SSO readiness - You can proceed with SSO configuration for verified domains
Multiple Domain Support
Organizations often need to verify multiple domains:- Primary domain - Your main corporate email domain
- Subsidiary domains - Acquired companies or regional offices
- Legacy domains - Historical domains still in use
- Alias domains - Alternative spellings or shortened versions
Domain Verification Best Practices
Planning
Planning
- Inventory all email domains used by employees - Identify domains that should NOT be claimed (e.g., personal email domains) - Coordinate with DNS administrators before starting - Plan for subsidiary and acquisition scenarios
Implementation
Implementation
- Verify your primary domain first - Test with a small pilot group before organization-wide rollout - Document which team manages each domain’s DNS - Keep verification records even after validation completes
Maintenance
Maintenance
- Review verified domains quarterly - Remove domains no longer in use - Update verification during domain migrations - Monitor for unauthorized domain usage attempts
Common Issues and Solutions
| Issue | Cause | Solution |
|---|---|---|
| Verification fails after 24 hours | DNS record not properly added | Check exact formatting and placement of TXT record |
| Users can’t access after verification | Domain policies too restrictive | Review and adjust enforcement settings |
| Subsidiary users not included | Domain not verified | Add and verify all subsidiary domains |
| External collaborators blocked | Strict domain enforcement | Configure guest user exceptions |
Domain verification is a one-time setup per domain, but the benefits apply to
all current and future users with email addresses from those domains.
Single Sign-On (SSO)
How SSO Works
- User attempts to log in to Factory
- Redirected to your Identity Provider (IdP)
- User authenticates with corporate credentials
- IdP sends SAML assertion back to Factory
- User is authenticated and provisioned if needed (see JIT below)
Supported SSO Providers
Factory supports integration with all major identity providers through WorkOS. Select your provider during setup:Popular SSO Providers
- SAML Providers
- OIDC Providers
- Enterprise Platforms
- Generic Options
- Okta - Full SAML 2.0 and SCIM support - Microsoft Azure AD / Entra ID - SAML and OIDC with SCIM - Google Workspace - SAML 2.0 with Google Groups mapping - OneLogin - SAML 2.0 and SCIM provisioning - Ping Identity / PingOne - Enterprise SAML federation - JumpCloud - SAML with cross-directory support - CyberArk - SAML with privileged access management - Duo (Cisco) - SAML with MFA integration
Magic Link Alternative
If your organization doesn’t use SSO, Factory also supports:- Magic Link Authentication - Passwordless email-based login
- Can be used alongside SSO for external collaborators
Just-In-Time (JIT) Provisioning
When SSO is enabled with JIT provisioning:- Users are automatically created on first successful login
- User profile is populated from SAML attributes
- Organization membership is created automatically
- No manual user invitation required
Configuring SSO
What You Need to Prepare
Before starting SSO setup:- Admin access to your identity provider
- Test users - Create a pilot group (e.g.,
factory-pilot-users) to test before organization-wide rollout - Group strategy - Decide which IdP groups map to Factory roles:
- Admin groups (e.g.,
factory-admins) - Member groups (e.g.,
factory-developers) - Read-only groups (e.g.,
factory-viewers)
- Admin groups (e.g.,
How Setup Works
WorkOS handles the technical configuration automatically. When you receive your setup link from Factory:
- Click the link and select your identity provider
- Follow the guided setup wizard specific to your IdP
- WorkOS automatically configures all SAML/OIDC settings
- Test the connection with your pilot group
- Roll out to your organization
Group-to-Role Mapping
During setup, you’ll configure how your IdP groups map to Factory roles:| Your IdP Group | Maps to Factory Role | Permissions |
|---|---|---|
factory-admins | Admin | Full access, manage users and settings |
factory-developers | Member | Create and edit content, use all features |
factory-viewers | Viewer | Read-only access |
factory-contractors | Member | Same as developers, but easier to track |
Testing Your Integration
After configuration, test with your pilot group:- Have a test user sign in via SSO from the Factory login page
- Initiate login from the Factory sign‑in page using “Sign in with SSO” / your IdP button.
- Verify that:
- The user is redirected to the IdP, authenticates, and returns to Factory.
- The user lands in the correct org/team with the expected role.
Directory Sync (SCIM) Provisioning
SSO controls how users authenticate; SCIM controls which users and groups exist in Factory. With SCIM enabled:- New employees in relevant IdP groups get access to Factory automatically.
- Users removed from those groups lose access automatically.
- Group membership changes propagate into Factory without manual updates.
Supported Directory Sync Providers
Factory supports SCIM 2.0 provisioning from these directory providers:- Full SCIM Support
- Partial Support
- Custom Integration
Providers with complete SCIM 2.0 implementation:
- Okta - Real-time provisioning with Okta Universal Directory
- Microsoft Azure AD / Entra ID - Enterprise directory sync
- OneLogin - User and group provisioning
- JumpCloud - Cross-platform directory services
- Google Workspace - Google Groups and organizational units
- PingOne - PingDirectory integration
- CyberArk - Privileged access provisioning
SCIM Features by Provider
| Provider | Users | Groups | Real-time | Nested Groups | Custom Attributes |
|---|---|---|---|---|---|
| Okta | ✅ | ✅ | ✅ | ✅ | ✅ |
| Azure AD / Entra ID | ✅ | ✅ | ✅ | ✅ | ✅ |
| Google Workspace | ✅ | ✅ | ✅ | ❌ | Partial |
| OneLogin | ✅ | ✅ | ✅ | ❌ | ✅ |
| JumpCloud | ✅ | ✅ | ✅ | ✅ | ✅ |
| Rippling | ✅ | Partial | ✅ | ❌ | Partial |
| Generic SCIM | ✅ | ✅ | Varies | Varies | Varies |
Configuring Directory Sync
What You Need to Prepare
Before enabling SCIM:- Decide which groups to sync - Not all IdP groups need Factory access
- Plan your group structure - Consider teams, roles, and access levels
- Identify service accounts - Separate human users from CI/CD accounts
- Review existing users - Understand how they’ll be affected when SCIM takes over
How SCIM Setup Works
WorkOS handles the SCIM configuration automatically. When you receive your setup link from Factory:
- WorkOS provides a SCIM endpoint URL and bearer token
- You enter these in your IdP’s SCIM configuration
- Select which groups to sync (e.g., only
factory-*groups) - WorkOS automatically handles:
- User attribute mapping (email, name, etc.)
- Group synchronization
- Real-time updates via webhooks
- Conflict resolution with existing users
Configuring SCIM in Your IdP
In your IdP’s SCIM settings for the Factory application:- Enable automatic provisioning.
- Paste the SCIM base URL and SCIM token from Factory.
- Choose which users and groups to sync (for example, only
factory-*groups). - Configure attribute mappings if required (for example,
userName→ email,displayName→ name).
What Happens When SCIM is Enabled
With SCIM in place, group management should happen only in your IdP. Use group naming and mapping rules such as:factory-org-owners→ Factory org Owners.factory-org-admins→ Factory org Admins.factory-users→ Factory Members.factory-ci-bots→ machine/service accounts with restricted permissions.
Data Management and Merging
User Identity Sources
Factory users can originate from multiple sources:- Directory Sync: Automatically provisioned via SCIM
- SSO JIT: Created on first SSO login
- Manual Invitation: Added by administrators
- API: Created programmatically
Merging Strategy
When users exist from multiple sources, Factory follows these rules:- Directory data takes precedence - SCIM attributes override all other sources
- Email-based matching - Users matched by email (case-insensitive)
- Soft deletes only - Users deactivated, not deleted, preserving audit trails
- Profile preservation - Non-directory fields retained during updates
Conflict Resolution
SSO vs Directory Sync
When both are enabled, potential conflicts include: Scenario: User logs in via SSO before directory provisions themResolution: Directory sync merges with SSO user on next sync Best Practice: Choose one primary method:
- Directory-first: Disable JIT, require directory provisioning
- SSO-first: Use JIT for creation, directory for updates
Email Case Sensitivity
All email matching is case-insensitive:John.Doe@company.com=john.doe@company.com- Prevents duplicate users from case variations
- Emails normalized to lowercase for comparison
Troubleshooting & best practices
Common issues and recommendations:-
Login loops or failures
- Verify ACS / redirect URLs exactly match what Factory provided.
- Confirm certificates or signing keys have not expired or been rotated without updating Factory.
-
User lands in wrong org or role
- Check group memberships and mapping rules.
- Ensure the intended groups are included in SAML assertions or ID tokens.
-
Provisioning not working
- Confirm SCIM is enabled in both Factory and your IdP.
- Check SCIM logs in your IdP for errors (invalid token, URL, or schema).
- Keep a small pilot group for initial rollout and future changes.
- Use clear, prefix‑based group names (for example,
factory-*) to keep IdP configuration maintainable. - Manage all role changes and access reviews in your IdP to leverage existing governance processes.
