See Single Sign-on with OpenID connect for a more general overview.
When using Open ID Connect sign in, the Softadmin® system will take the role of the relying party (or RP), and the Open ID Provider (or OP) will take the role of the identity provider (or IdP).
In this document, Softadmin® will refer to the Softadmin® system to configure, and IdP will refer to the Open ID Provider.
The Softadmin® administrator will need these values from the Open ID administrator:
openid
to request, if any.The Open ID administrator will need these values from the Softadmin® administrator:
The Open ID administrator may need to know which flow Softadmin® uses, in which case the answer is always the code flow.
In addition, the two will may to agree on which claims should be passed to the Softadmin® system in the id_token.
This is the URL from which Softadmin® downloads all information about the Open ID Provider, including which URLs its web services are reachable at, and which encryption keys it uses.
It usually ends with /.well-known/openid-configuration
.
Equivalent to username and password. These values are used by Softadmin® when it calls the Open ID Provider's web services.
Scopes define the information about the end user, and possibly permissions other than information, that Softadmin® requests.
Softadmin® will always request the openid
scope. Common additional scopes to request are email
and profile
, but you will need to ask the Open ID administrator which other scopes you should request.
The redirect URI is where Softadmin® wants the Open ID provider to send users after they have authenticated themselves. It is case sensitive.
It usually ends with LoginPostback?op=xxxxxx
where op is a unique ID that Softadmin® has assigned to the IdP.
A JSON token with user data that Softadmin® receives.
Go to Admin -> Single Sign-on -> OpenID Connect.
Under the System settings tab
Under the OpenID Identity Providers tab
Exactly how an IdP is configured depends on what software is used, but you will need to:
You may need to: