Authentication
Rime supports four authentication methods. SSO via SAML 2.0 or OIDC is the primary path for enterprise customers. Google OAuth and email/password are available as secondary options for smaller teams or initial setup.
Authentication is configured at the tenant level. Navigate to Settings > Authentication to manage your authentication methods.
SSO via SAML 2.0
SAML 2.0 single sign-on allows your users to authenticate through your existing identity provider (Azure AD, Okta, OneLogin, PingFederate, or any SAML 2.0-compliant IdP). Users sign in once through the IdP and are redirected to Rime with an authenticated session.
Configuring SAML 2.0
- Navigate to Settings > Authentication > SSO
- Select SAML 2.0 as the SSO protocol
- Note the SP metadata values that you will need to configure in your IdP:
- Entity ID —
https://{tenant}.rimedata.io/saml/metadata - ACS URL (Assertion Consumer Service) —
https://{tenant}.rimedata.io/api/auth/saml/callback - SP metadata URL —
https://{tenant}.rimedata.io/api/auth/saml/metadata(some IdPs can import this directly)
- Entity ID —
- Configure your IdP with the SP metadata values above and obtain:
- IdP Entity ID — the identifier for your IdP (provided by your IdP)
- IdP SSO URL — the URL where Rime sends authentication requests
- IdP Certificate — the X.509 certificate used to verify SAML responses
- Enter these values in the Rime configuration form
- Select Save
Attribute mapping
Rime expects the following attributes in the SAML assertion:
| Rime attribute | Common IdP attribute names | Required |
|---|---|---|
email, http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress | Yes | |
| First name | firstName, http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname | Yes |
| Last name | lastName, http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname | Yes |
If your IdP uses different attribute names, configure the mapping in Settings > Authentication > SSO > Attribute Mapping. Enter the exact attribute name as it appears in your IdP’s SAML assertion for each required field.
Testing SAML
After saving the configuration, select Test Connection. Rime will:
- Generate an AuthnRequest and redirect you to your IdP
- After you authenticate at the IdP, the IdP posts a SAML Response back to Rime
- Rime validates the response signature, extracts the attributes, and shows the result
If the test fails, the error message will indicate whether the issue is with the IdP URL, certificate, or attribute mapping.
SSO via OIDC
OpenID Connect (OIDC) is an alternative to SAML for IdPs that support it. Many modern IdPs (Azure AD, Okta, Auth0, Keycloak) support both protocols.
Configuring OIDC
- Navigate to Settings > Authentication > SSO
- Select OIDC as the SSO protocol
- Note the Callback URL that you will need to register in your IdP:
https://{tenant}.rimedata.io/api/auth/oidc/callback - Register Rime as a client application in your IdP. You will need to provide:
- The callback URL above
- Requested scopes:
openid,email,profile
- Obtain from your IdP:
- Discovery URL — the OpenID Connect discovery endpoint (e.g.,
https://login.microsoftonline.com/{tenant-id}/v2.0/.well-known/openid-configuration) - Client ID — the application/client identifier assigned by your IdP
- Client Secret — the client secret generated by your IdP
- Discovery URL — the OpenID Connect discovery endpoint (e.g.,
- Enter these values in the Rime configuration form
- Select Save
OIDC scopes
Rime requests these scopes by default:
| Scope | Purpose |
|---|---|
openid | Required for OIDC. Returns a subject identifier |
email | Returns the user’s email address |
profile | Returns first name and last name |
If your IdP requires additional scopes, you can add them in the Additional Scopes field (comma-separated).
Testing OIDC
Select Test Connection to initiate an OIDC flow. Rime will redirect you to your IdP’s authorization endpoint. After authentication, Rime exchanges the authorization code for tokens and displays the result, showing which user attributes were received.
Google OAuth
Google OAuth allows users to sign in with their Google account. This is convenient for teams that use Google Workspace but do not have a dedicated IdP.
Enabling Google OAuth
- Navigate to Settings > Authentication > Google OAuth
- Toggle Enable Google OAuth
- Optionally, restrict sign-in to specific email domains. Enter one or more domains (e.g.,
yourcompany.co.nz). If no domains are specified, any Google account can sign in - Select Save
When domain restriction is enabled, users whose Google account email does not match an allowed domain will see an error after authenticating with Google.
Google OAuth does not require you to create a Google Cloud project or configure OAuth credentials — Rime manages this internally.
Email and password
Email/password authentication is available as a fallback for organisations that do not use SSO or as a method for initial administrator setup before SSO is configured.
Password requirements
Passwords must meet these requirements:
- Minimum 12 characters
- At least one uppercase letter
- At least one lowercase letter
- At least one digit
- At least one special character
Passwords are hashed using Argon2id before storage. Rime never stores plaintext passwords. Argon2id is the current recommended algorithm for password hashing, providing resistance against both GPU-based and side-channel attacks.
Password reset
Users can reset their password by selecting Forgot password on the sign-in page. A reset link is emailed to the registered address. The link expires after 1 hour.
Administrators can force a password reset for any user from Settings > Users > [User] > Force Password Reset.
Multi-factor authentication
Rime does not implement its own MFA mechanism. Instead, MFA is handled by your identity provider when using SAML 2.0 or OIDC. If your IdP requires MFA, the MFA challenge is presented during the IdP authentication step before the user is redirected back to Rime.
For Google OAuth, Google’s own MFA settings apply. If a user has 2-Step Verification enabled on their Google account, they will be prompted for it during sign-in.
For email/password authentication, MFA is not currently available. Organisations requiring MFA should use SSO.
Session management
After successful authentication, Rime issues a session token:
- Token lifetime — sessions expire after 8 hours of inactivity or 24 hours from creation, whichever comes first
- Refresh — active sessions are refreshed automatically. A user who is actively using Rime will not be logged out at the 8-hour mark
- Revocation — administrators can revoke a user’s session from Settings > Users > [User] > Revoke Sessions. The user will need to re-authenticate
- Token storage — session tokens are held in memory on the client side. They are not stored in localStorage or cookies, which reduces exposure to XSS attacks
All session events (creation, refresh, expiry, revocation) are recorded in the audit log.
SSO tier requirement
SSO (both SAML 2.0 and OIDC) requires Business tier or above. Free/Trial and Small Business tiers are limited to Google OAuth and email/password authentication.
If your organisation requires SSO for procurement approval, contact Rime sales to arrange a Business tier trial.
Next steps
- Review Encryption to understand how credentials are protected
- Set up Audit Logging to track authentication events
- Configure roles and masking visibility in Masking Policies
- Review the Compliance page for regulatory requirements around authentication