Settings
You can control the following two settings independently to manage how users join your organization.JIT provisioning
Thejit_provisioning_enabled setting controls automatic user provisioning. When enabled, users who authenticate via your SSO provider are automatically added to your organization and assigned to default workspaces with a default role. For more details, refer to Configure default SSO settings. When disabled, users must be explicitly invited or added via SCIM before they can access the organization.
Invites
Theinvites_enabled setting controls manual user invitations. When enabled, organization administrators can send invitations to users before they sign in. Invited users can claim their invite when signing in via SSO. When disabled, manual invitations are not allowed and users can only join via JIT provisioning or SCIM.
Update settings
You can update these settings in the LangSmith UI or with the LangSmith API:- UI
- API
In the LangSmith UI:
- Navigate to Settings → Organization → Access and Security → General.
- Toggle Enable JIT provisioning and Allow invites as needed.
- Configure SSO default workspaces and roles in Settings → Organization → SSO Configuration.
Consider the following if you are using LangSmith self-hosted:
- The JIT provisioning and the invites settings only apply to the default organization (identified by
default_sso_provision=true). Other organizations must use invites in self-hosted. - The environment variable
SELF_HOSTED_JIT_PROVISIONING_ENABLEDcan globally override the JIT provisioning setting. When set tofalse, JIT provisioning is disabled for all organizations regardless of their individual settings. - For additional self-hosted user management customizations, refer to Customize user management.
How user access works
When a user attempts to sign in via SSO, LangSmith follows this decision flow:- User authenticates with SSO provider.
- LangSmith checks if user already has organization access:
- Check if invites are enabled and a pending invite exists:
- Check if JIT provisioning is enabled:
When both JIT provisioning and invites are enabled, invites take precedence. If a user has a pending invitation, they are added with the invite’s contents, not the default SSO settings.
Configuration scenarios
Open access (both enabled)
Configuration:- ✓ JIT Provisioning enabled
- ✓ Invites enabled
- Users can sign in immediately via SSO and are auto-provisioned.
- Admins can send invites to assign specific roles or workspaces.
- Invited users get the invite configuration; non-invited users get default SSO configuration.
JIT only (invites disabled)
Configuration:- ✓ JIT Provisioning enabled
- ✗ Invites disabled
- All users who authenticate via SSO are automatically provisioned.
- Admins cannot send invitations.
- All new users receive the same default workspaces and role.
Invite only (JIT disabled)
Configuration:- ✗ JIT Provisioning disabled
- ✓ Invites enabled
- Users must be invited before they can access the organization.
- Users without invites are denied access even with valid SSO credentials.
- Fine-grained control over who can access the organization.
Closed access (both disabled)
Configuration:- ✗ JIT Provisioning disabled
- ✗ Invites disabled
- SSO users cannot join the organization automatically.
- Invitations cannot be sent.
- Users must be provisioned through SCIM or directly by an administrator once they are already part of the organization via SCIM.
User access quick reference
| JIT enabled | Invites enabled | Pending invite | Result |
|---|---|---|---|
| ✓ | ✓ | Yes | Invite claimed (invite configuration used) |
| ✓ | ✓ | No | Auto-provisioned (default SSO configuration) |
| ✓ | ✗ | N/A | Auto-provisioned (default SSO configuration) |
| ✗ | ✓ | Yes | Invite claimed |
| ✗ | ✓ | No | Access denied - must be invited |
| ✗ | ✗ | N/A | Access denied - must use SCIM or admin |
Configure default SSO settings
When JIT provisioning is enabled, configure default settings for new users:- Default workspace role. Choose the workspace role that users receive when automatically provisioned. For details on what each role can do, refer to Organization and workspace operations. Options include:
-
Default workspaces. Select one or more workspaces that users are automatically added to. Users receive the same role in all selected workspaces. To configure:
- Go to Settings → Organization → SSO Configuration.
- Set Default workspace role.
- Select Default workspaces.
- Save your configuration.
SCIM integration
If your organization uses SCIM (System for Cross-domain Identity Management), users can be automatically provisioned and managed through your identity provider. SCIM provides an additional mechanism for user management that works alongside JIT and invite settings.SCIM group membership overrides manually assigned roles or roles assigned via JIT provisioning. If you’re using SCIM, consider disabling JIT provisioning to avoid conflicts.
Related documentation
- Set up SSO with OAuth2.0 and OIDC (Self-hosted)
- Set up SAML SSO (Cloud)
- Set up SCIM
- User management
- Role-based access control
Connect these docs to Claude, VSCode, and more via MCP for real-time answers.