Skip to end of metadata
Go to start of metadata

You are viewing an old version of this content. View the current version.

Compare with Current View Version History

« Previous Version 3 Next »

Single sign-on (SSO) is a method of allowing a user to access multiple applications or platforms with a single sign-on.

Sidebar dropdown → Organisation → OIDC SSO Connection

Fill the fields under the OIDC SSO connection section

Example for Microsoft Active Directory

An App needs to be created from your Azure portal, you can call it Feedier.

Under API permissions, make sure to enable: Microsoft Graph

  • email

  • openid

  • roles

  • User.Read

  • Authentication → Web → Redirect URIs: https://dashboard.feedier.com/auth/oidc/callback?organizationId={Organization ID in Feedier}

Then, in the organization settings: 

URL name

Typical URL 

Discovery Endpoint

https://login.microsoftonline.com/{tenant_id}/v2.0/.well-known/openid-configuration

Authorization Endpoint

https://login.microsoftonline.com/{tenant_id}/oauth2/v2.0/authorize

Userinfo Endpoint

https://graph.microsoft.com/oidc/userinfo

Token Endpoint

https://login.microsoftonline.com/{tenant_id}/oauth2/v2.0/token

Base URL

https://login.microsoftonline.com/{tenant_id}/v2.0

The IDs and URLs with your custom ID can be found directly in the tool you want to use for SSO (e.g. Microsoft, Okta,...).

For further reading, here’s an example of adding an OpenID Connect-based single sign-on application:

https://learn.microsoft.com/en-us/azure/active-directory/manage-apps/add-application-portal-setup-oidc-sso

  • No labels

0 Comments

You are not logged in. Any changes you make will be marked as anonymous. You may want to Log In if you already have an account.