Overview
Phoenix Cloud supports multiple authentication methods:- Email/Password: Standard username and password authentication
- OAuth2/OIDC: Single Sign-On with Google, GitHub, Microsoft, and custom providers
- SAML (Enterprise): SAML 2.0 for enterprise identity providers
- API Keys: Programmatic access for applications
User Management
Creating Users
Self-Service Sign-Up
Users can sign up at app.phoenix.arize.com:- Click “Sign Up”
- Choose authentication method (Email, Google, GitHub)
- Complete verification
- Join or create a workspace
Admin-Provisioned Users
Admins can invite users via the UI:User Roles
Full access to all resources and settings:
- Manage users and roles
- Configure authentication
- Manage API keys
- Create and delete projects
- Full read/write access to all data
Standard user access:
- Read/write access to projects
- Create datasets and experiments
- Run evaluations
- Create personal API keys
- Cannot manage users or settings
Read-only access:
- View traces and evaluations
- View datasets and experiments
- Cannot modify data
- Cannot create API keys
Deactivating Users
Admins can deactivate users:- Navigate to Settings > Users
- Click user menu > Deactivate
- Confirm deactivation
- Cannot log in
- API keys are revoked
- Data remains in system
Single Sign-On (SSO)
Google OAuth
Enable Google SSO for your workspace:GitHub OAuth
Enable GitHub SSO:Create OAuth App
Create an OAuth App in GitHub:
- Go to Settings > Developer settings > OAuth Apps
- Click “New OAuth App”
- Set Authorization callback URL:
Configure in Phoenix
Navigate to Settings > Authentication > OAuth ProvidersEnter:
- Client ID from GitHub
- Client Secret from GitHub
Microsoft Entra ID (Azure AD)
Configure Microsoft SSO:Register application
Register an app in Azure AD:
- Go to Azure Portal > App registrations
- Click “New registration”
- Set Redirect URI:
SAML 2.0 (Enterprise)
Configure SAML for enterprise identity providers (Okta, OneLogin, etc.):SAML SSO is available on Enterprise plans. Contact Sales to enable.
Get SAML metadata
From Phoenix Cloud:Navigate to Settings > Authentication > SAMLCopy:
- Entity ID:
https://app.phoenix.arize.com/saml/metadata - ACS URL:
https://app.phoenix.arize.com/saml/acs - Metadata URL:
https://app.phoenix.arize.com/saml/metadata.xml
Configure IdP
In your identity provider (Okta, OneLogin, etc.):
- Create new SAML application
- Set Single Sign-On URL to ACS URL
- Set Audience URI to Entity ID
- Configure attribute mappings:
email→ user emailfirstName→ user first namelastName→ user last namegroups(optional) → user groups
Configure Phoenix
In Phoenix Cloud (Settings > Authentication > SAML):Enter:
- IdP Entity ID: From your IdP metadata
- IdP SSO URL: Single Sign-On URL from IdP
- IdP Certificate: X.509 certificate from IdP
Custom OIDC Provider
Connect any OIDC-compliant identity provider:Get OIDC configuration
From your identity provider, get:
- OIDC Discovery URL (
.well-known/openid-configuration) - Client ID
- Client Secret
Group-Based Access Control
Map identity provider groups to Phoenix roles:Configure Group Mappings
Navigate to Settings > Authentication > Group MappingsAuto-Provisioning with Groups
When group mappings are configured:- User logs in via SSO
- Phoenix reads group claims from IdP
- User is assigned role based on group membership
- User account is auto-created (if enabled)
- Role is updated on each login
Users must belong to at least one mapped group to access Phoenix.
Multi-Factor Authentication
Enforcing MFA
Admins can require MFA for all users:Setting Up MFA (User)
Users can enable MFA:- Click profile icon > Account Settings
- Navigate to Security
- Click “Enable MFA”
- Scan QR code with authenticator app (Google Authenticator, Authy, etc.)
- Enter verification code
- Save recovery codes
Session Management
Session Settings
Configure session timeouts:Maximum session duration before re-authentication required
Session expires after this period of inactivity
Allow users to stay logged in for extended periods
Active Sessions
Users can view and revoke active sessions:- Navigate to Account Settings > Security > Active Sessions
- View list of active sessions with:
- Device/browser information
- IP address
- Last activity time
- Click “Revoke” to end a session
Access Logs
Audit user authentication and access:Viewing Access Logs
Admins can view access logs: Navigate to Settings > Security > Access Logs Logs include:- Login attempts (successful and failed)
- Session creation/termination
- API key usage
- Permission changes
- Resource access
Log Retention
- Free Tier: 7 days
- Pro Tier: 30 days
- Enterprise Tier: 90 days (configurable up to 365 days)
Exporting Logs
Export access logs for compliance:Password Policies
Default Policy
- Minimum length: 8 characters
- Must include: uppercase, lowercase, number
- Cannot be common password
- Cannot match username
Strong Password Policy (Enterprise)
Enable enhanced password requirements:- Minimum length: 12 characters
- Must include: uppercase, lowercase, number, special character
- Cannot reuse last 5 passwords
- Expires after 90 days
- Account lockout after 5 failed attempts
Account Recovery
Password Reset
Users can reset passwords:- Click “Forgot Password” on login page
- Enter email address
- Check email for reset link (valid for 1 hour)
- Set new password
Account Lockout
After 5 failed login attempts:- Account is locked for 30 minutes
- User receives email notification
- Admin can manually unlock in Settings > Users
Best Practices
Troubleshooting
SSO Login Fails
Check common issues:- Redirect URI mismatch: Verify callback URL in IdP matches Phoenix
- Clock skew: Ensure IdP and Phoenix clocks are synchronized
- Certificate expired: Check IdP certificate validity
- Missing claims: Verify IdP sends required claims (email, name)
User Cannot Access Resources
Verify:- User role assignment (Settings > Users)
- Group mappings (if using group-based access)
- Project permissions
- Account is not deactivated
MFA Not Working
Common fixes:- Check time synchronization on authenticator app
- Use recovery code if codes don’t work
- Re-scan QR code to re-register device
- Contact admin to reset MFA
Next Steps
API Keys
Manage API keys for programmatic access
Security
Configure encryption and network security
Phoenix Cloud
Learn more about Phoenix Cloud features