Configuring SSO via OpenID Connect (OIDC)
- Log in to the Admin Dashboard and navigate to the Applications section.
- Add New Application or modify an existing application for OpenID Connect setup.
- Choose OpenID Connect as the Authentication Protocol:
- Enter the Client ID, Client Secret, Authorization Endpoint, Token Endpoint, and UserInfo Endpoint.
- Provide the Redirect URIs for handling OpenID Connect responses.
- Configure Claims and Scopes:
- Define which claims (e.g., sub, name, email) will be provided to the application.
- Configure the necessary scopes, such as openid, profile, email.
- User Attribute Mapping: Map user attributes from the Fixiam solution to OpenID Connect claims, ensuring the application receives the necessary information.
- Access Assignment: Determine which users or groups will have access to the application via OpenID Connect.
- Test the Integration by simulating a user login to verify that OpenID Connect authentication works correctly.
- Save Configuration and finalize deployment.
Before you begin
Review Welcome to OpenID Connect to learn about the OpenID Connect Foundation (OIDF) and to review the full protocol specification.
- Create an integration: In the Fixiam Admin Console, go to Applications -> Apps.
- Click Add New Application.
- Select Custom Application.
- Select Configure SSO using OIDC/OAuth and click Next.
- Provide the general information for the integration and then click Next.
- Provide the necessary OIDC settings information for your integration. Seenext page for descriptions of individual fields.
- Optional: Define additional authentication factors on Login Flow tab.
- Click Next and your integration is now created.
Updated about 2 months ago
