All Products
Search
Document Center

Identity as a Service:DingTalk Enterprise SSO

Last Updated:Mar 31, 2026

Configure single sign-on (SSO) between IDaaS and Dedicated DingTalk to connect your organization's account system to DingTalk.

For an end-to-end walkthrough including user logon steps, see Log on to DingTalk Enterprise using an AD, LDAP, or IDaaS account.

Prerequisites

Before you begin, make sure you have the dedicated account feature of Dedicated DingTalk enabled.

Step 1: Create the application in IDaaS

  1. In the IDaaS console, go to Application > Marketplace and search for DingTalk Enterprise.

  2. Add the application. After the application is added, you are automatically redirected to the SSO configuration page.

image

Step 2: Configure SSO in IDaaS

IDaaS preconfigures all SSO settings for DingTalk Enterprise. Adjust the following settings based on your environment.

Set the authorization mode and scope

  1. Set the authorization mode to Implicit Mode and select id_token as the token type. The Redirect URIs field is pre-filled with the following value:

    https://login.dingtalk.com/oauth2/oidcCallBack.htm
  2. For the authorization scope, select All Users to grant access to all employees. If only a subset of employees needs Dedicated DingTalk, select Manual Authorization and authorize specific accounts or organizations.

image

Configure the sub claim

In the advanced configuration, the extended id_token must include a claim named sub. Dedicated DingTalk uses the sub value to match the user's userid and complete the logon.

Important

If the sub value is invalid, users cannot log on to Dedicated DingTalk using SSO.

image

Choose your configuration based on how your users are managed:

If your users are synced from IDaaS to Dedicated DingTalk

Methodsub value formatNotes
Fixed field mappinguser.{IDaaS field name}, e.g., user.userid or user.usernameThe value must match the DingTalk userid field in the DingTalk Enterprise identity provider field mapping.
Binding relationshipuser.identityProviderUserMap.{idpId}.identityProviderUserIdThe IDaaS account is already bound to the DingTalk user by default. No further action is required. Find idpId on the identity provider page.

If your users already exist in Dedicated DingTalk

Methodsub value formatNotes
Fixed field mappinguser.{IDaaS field name}, e.g., user.userid or user.usernameThe userid and sub values of the DingTalk Enterprise user must match. See Advanced account field expressions.
Binding relationshipuser.identityProviderUserMap.{idpId}.identityProviderUserIdUse the mapping identifier in the field mapping to bind existing accounts. After binding, accounts are ready to use. See Field mapping. Find idpId on the identity provider page. image

Step 3: Configure SSO in the DingTalk admin console

  1. Log on to the DingTalk admin console.

  2. Go to Security and Permissions > Organization Code Logon, then copy or request an organization code. Set the logon mode to SSO Logon.

    Users need this organization code to log on to Dedicated DingTalk.
  3. Go to Security and Permissions > SSO Settings and enter the following parameters. Retrieve each value from the IDaaS application you created in Step 1.

    DingTalk fieldWhere to find it in IDaaS
    Configuration modeSelect OIDC Protocol Authentication
    Client IDGeneral configuration > client_id
    IssuerLogon Access > Single Sign-On > Application Configuration Information > Issuer
    Authorization URLLogon Access > Single Sign-On > Application Configuration Information > Authorization Endpoint
    OpenID Config URLLogon Access > Single Sign-On > Application Configuration Information > Discovery Endpoint

Step 4: Test SSO

Dedicated DingTalk supports only service provider (SP)-initiated SSO. Users must start the logon from the DingTalk side. Identity provider (IdP)-initiated logon is not supported.

For detailed user logon steps, see User logon steps.