Skip to main content

OIDC

Step-by-step guide to configure Single Sign-on using OIDC with any Identity Provider.

1. OIDC Configuration

Sign into the SSO Configuration Portal, select Custom Provider, then OIDC, and click on Configure.

Select Custom Provider→OIDC and then
Configure

Select Custom Provider→OIDC and then Configure

Copy the Redirect URl from the SSO Configuration Portal.

Copy Redirect
URI

Copy Redirect URI

On your Identity Provider portal, select OIDC as the integration method, and Web Applications as application type.

Paste this Redirect URI in the sign in redirect URI space on your identity provider portal

2. Attributes Mapping

On your identity provider portal, if attribute mapping is required, map the given attributes exactly as shown below.

tip

Usually, you don't have to configure any attributes and by default - most identity providers support standard OIDC claims to send user information as part of ID Token or User Info endpoint.

Map exact attributes shown

Map exact attributes shown

3. Assign User/Group

Choose who can access the app by assigning users to your app on your identity provider portal.

4. IdP configuration

Find the client ID from your identity provider portal. Paste this in the space for Client ID on your SSO Configuration Portal.

Enter copied Client ID in the SSO Configuration
Portal

Enter copied Client ID in the SSO Configuration Portal

Similarly, generate and copy the Client Secret from your SSO Configuration Portal and paste it under Client Secret under IdP Configuration.

Enter copied Client Secret in the SSO Configuration
Portal

Enter copied Client Secret in the SSO Configuration Portal

Find and copy the Issuer URL from your custom provider’s portal.Paste the above URL in the SSO configuration Portal under Issuer URL. Click on Update.

Enter copied Issuer URL, and click
Update

Enter copied Issuer URL, and click Update

info

We support configuring Issuer URL field with Discovery Endpoint also.

Discovery Endpoints usually end with ./well-known/openid-configuration

6. Finalize App

Your IdP configuration section on the SSO Configuration Portal should look something like this once you’re done configuring it.

Completed view of IdP configuration on the SSO Configuration
Portal

Completed view of IdP configuration on the SSO Configuration Portal

7. Test Connection

Click on Test Connection. If everything is done correctly, you will see a Success response as shown below.

If the connection fails, you’ll see an error, the reason for the error, and a way to solve that error right on the screen.

Test SSO
Configuration

Test SSO Configuration

8. Enable connection

Click on Enable Connection. This will let all your selected users login to the new application via OIDC.

Enable OIDC Connection

Enable OIDC Connection

With this, we are done configuring your application for an OIDC login setup.


Is this page helpful? Yes No