Integrate Release with Digital.ai Platform Identity Service
This guide provides step-by-step instructions for integrating Digital.ai Release with the Digital.ai Platform.
The Platform uses your existing single-sign on (SSO) infrastructure to securely authenticate users in Release using the same corporate credentials they already use. Acting as a bridge between your identity provider (IdP) and Release, the Platform grants access to Release based on user data from your IdP, eliminating the need for unique credentials in Release. This integration also allows you to map user groups in your IdP to specific roles in Release.
This guide assumes that you have already installed Release and configured one or more roles. If you have not yet done so, see the Release documentation.
The following diagram summarizes the workflow required to complete this integration:

If you have any questions or run into any issues following this guide, please reach out to Customer Support.
Step 1: Gain Access to the Platform
Before doing anything else, you need an administrator user for your Platform account.
It is possible that an initial admin user could have already been created for you when your Digital.ai account was established, so it is recommended to check for an existing administrator in your organization before reaching out to Digital.ai support. However, if you have no record of an administrator being created, then you should contact your Digital.ai representative to request an initial set of credentials. This initial administrator can invite others as needed.
During this process, you should have also received a unique URL for your Platform account, which you will use to perform all the tasks in this guide.
Your unique URL is formatted like this: https://CUSTOMERNAME.REGION.digital.ai
For example: https://exampletech.us.digital.ai
Step 2: Connect Identity Provider with the Platform
In this step, you'll learn how to connect your corporate IdP with the Digital.ai Platform.
The process differs slightly based on whether you are using an OIDC provider or SAML provider. These differences are noted when appropriate.
Gather Required Data
Before you begin, you must obtain some essential details from your IdP.
This information can be obtained by reviewing the Digital.ai application configured in your IdP. If you have not already created an application for Digital.ai, you must do so before continuing. It is recommended to work with your IT team or whoever manages SSO administration at your company.
For OIDC Connections
- Client ID
- Client secret
- metadata URL (
.well-known/openid-configuration endpoint) - The claim names for the following user information: first name, last name, username, email
For SAML Connections
- metadata URL (different IdPs may have different names for this)
- The assertion names for the following user information: first name, last name, username, email.
Establish SSO Connection
To start, click the Setup identity provider button on the Overview page to open the configuration wizard. Alternatively, you can click Identity Providers in the left navigation, then click the Add identity provider button.

This wizard leads you through all the steps necessary to connect your IdP to the Platform. Most pages in the wizard include descriptions for each field and option, so you should be able to follow along easily, but this section includes some conceptual and clarifying information that will help you through the process.
Select provider

On this page you'll enter basic details about your IdP, such as the SSO protocol service and the name that will appear on the login button.
Config identity provider and metadata

This page provides you with the Redirect URI for your Platform site, and gives you the opportunity to prepopulate the rest of the wizard with necessary details
First, you'll need to copy the Redirect URI and then open a new browser tab or window to move over to your IdP account. There, use the Redirect URI to identify the Digital.ai Platform as a valid redirect URL in your IdP account. The process for completing this task will differ depending on which IdP you use. Depending on your role in your organization, you may need assistance from IT or whoever manages SSO administration at your company.
Once you've done this, you should be able to find the metadata URL if you hadn't already.
Now choose I have the metadata URL for my identity provider and paste the metadata URL into the Enter Metadata URL field, then click Import.
General

On this page, paste your Client ID and Client Secret values (which you obtained in the prerequisite step) into the appropriate fields.
The remaining fields on the page will be automatically completed, so you can accept all the defaults and continue to the next step in the wizard.
Advanced config

This page is entirely optional. Unless you have been specifically told otherwise, you can accept all the defaults and click Next.
Add mappers

This page allows you to add mappers to ensure that user data from your IdP is properly understood by the Platform. Your identity provider shares information about your users with Digital.ai in the form of key/value pairs (known as claims or assertions, depending on the IdP), and the Platform uses this data to create users in our system.
Mappers are required for SAML connections, but optional for OIDC connections unless your IdP uses non-standard claim names.
OIDC
Whether or not you need to use mappers to handle this data is entirely dependent on your organization's unique situation, and in general the {{site.data.identifiers.companyName}} {{site.data.identifiers.productName}} expects to receive user attributes based on the set of standard claims as defined by OpenID. You can view the list of standard claims here: https://openid.net/specs/openid-connect-core-1_0.html#StandardClaim.
If your data is stored as the claims identified in this list (i.e. given_name, family_name, email, etc.), then you typically would not need to bother creating any attribute mappers.
For example, if your IdP uses the standard claim "email": john@example.com, the Platform will automatically map that to the Platform's email user attribute.
However, if your IdP uses a claim called "email_address": john@example.com, then you would need to create a mapper to correctly get that data into the Platform's email user attribute.
SAML
Unlike OIDC, the SAML protocol has no standard naming conventions for the attributes it stores (which SAML tokens refer to as assertions). For this reason, mappers are needed for SAML connections, because each IdP's assertions may be named differently. So in order for the Platform to understand the data correctly, you must provide the assertion values as they are named in your IdP.
When creating mappers for SAML connections, you must add mappers for the following user data: first name, last name, email.
Username data is automatically pulled from the NameID attribute (based on the NameID Policy Format / Principal Type fields defined in the SAML IdP). You do not need to create a mapper for username if you need to override the default assertion.
How to Add Mappers
If you have determined that you need to add mappers, then follow this procedure:
- Click the Add drop-down arrow, and select Mapper.
- In the Add mapper window, set the following fields:
- Name is merely a way to identify the mapper. Enter something like
First Name Mapper. - Sync Mode controls whether an update to a user attribute in your IdP will cause an update in the platform. Using INHERIT is suggested.
- FORCE always updates the Platform user when there is a change in your IdP.
- IMPORT never updates the Platform user after they are created the first time, regardless of changes in your IdP.
- INHERIT uses the value that has been configured on the Advanced config page of this IdP connection.
- Mapper Type should be set to Attribute Importer.
- (For OIDC providers only) Claim is the name of the claim as specified by your IdP.
- User Attribute Name is the Platform user attribute that the data will be mapped to. This should be set to
username,email,firstName, orlastNamedepending on the data you're mapping. - (For SAML providers only) Attribute name is the name of the assertion as specified in your IdP's SAML token. You can add the name in either Attribute Name or Friendly Name (you must complete at least one of the fields, but you do not need to complete both).
- Click Add Mapper.
- Repeat the previous steps to add additional mappers.
Summary

This page provides an overview of the configuration details for informational purposes.
To complete the wizard, click Create identity provider. A new button will now appear on the Platform login page with the name you added at the beginning of this procedure.

Set IdP as Default
It is recommended to set this IdP as default, which will skip the {{site.data.identifiers.productName}} login screen and send users to the IdP authentication page as if they had clicked the button for it. If they already have an active session, most IdPs will redirect the user to the application directly and they will not see a login screen at all.
To set the IdP as default, return to the Identity providers page and click the star icon under Actions.

If you need to override the default IdP login screen and authenticate using your local credentials, you can append the following query parameter to the end of your Digital.ai Platform account URL: /?loginIdp=local. For example: https://exampletech.digital.ai/?loginIdp=local