Configuring SSO via OpenID Connect (OIDC)

  1. Log in to the Admin Dashboard and navigate to the Applications section.
  2. Add New Application or modify an existing application for OpenID Connect setup.
  3. Choose OpenID Connect as the Authentication Protocol:
  • Enter the Client ID, Client Secret, Authorization Endpoint, Token Endpoint, and UserInfo Endpoint.
  • Provide the Redirect URIs for handling OpenID Connect responses.
  1. Configure Claims and Scopes:
  • Define which claims (e.g., sub, name, email) will be provided to the application.
  • Configure the necessary scopes, such as openid, profile, email.
  1. User Attribute Mapping: Map user attributes from the Fixiam solution to OpenID Connect claims, ensuring the application receives the necessary information.
  2. Access Assignment: Determine which users or groups will have access to the application via OpenID Connect.
  3. Test the Integration by simulating a user login to verify that OpenID Connect authentication works correctly.
  4. Save Configuration and finalize deployment.

Before you begin

Review Welcome to OpenID Connect to learn about the OpenID Connect Foundation (OIDF) and to review the full protocol specification.

  1. Create an integration: In the Fixiam Admin Console, go to Applications -> Apps.
  2. Click Add New Application.
  3. Select Custom Application.
  4. Select Configure SSO using OIDC/OAuth and click Next.
  5. Provide the general information for the integration and then click Next.
  6. Provide the necessary OIDC settings information for your integration. Seenext page for descriptions of individual fields.
  7. Optional: Define additional authentication factors on Login Flow tab.
  8. Click Next and your integration is now created.