ºÚÁϺ£½Ç91Èë¿Ú

SSO with OIDC

Use ºÚÁϺ£½Ç91Èë¿Ú OpenID Connect (OIDC) Single Sign On (SSO) to give your users secure and convenient access to their OIDC-capable web applications with a single set of credentials. You can use the Custom OIDC App connector with any application that supports OIDC-based SSO. 

Preconfigured OIDC applications are not currently available in the ºÚÁϺ£½Ç91Èë¿Ú catalog. For now, you must use the Custom OIDC App to configure OIDC applications. You need in-depth knowledge of the Relying Party’s (RP) OIDC capabilities and requirements to use the OIDC connector. 

 Prerequisites

  • The RP application must support a grant type of authorization code
  • You must know the Redirect URI for the application you want to configure with OIDC
  • You must know the Login URL that the RP uses to start the login flow
  • Determine if the app you are configuring can protect a client secret or if it uses a public client
  • Determine any needed claims/attributes that the RP wants

Configuring the Custom OIDC Connector

To configure ºÚÁϺ£½Ç91Èë¿Ú

  1. Log in to the .
  2. Go to USER AUTHENTICATION > SSO Applications.
  3. Click + Add New Application. There are two options:
    • Type OIDC in the Search field and select it from the dropdown.
      • Click Next.
    • Select Custom Application.
      • Click Next.
      • Select Manage Single Sign-On and then Configure SSO with OIDC
      • Click Next.
  1. In the Display Label, type your name for the application. Optionally, you can enter a Description, adjust the User Portal Image and choose to hide or Show in User Portal.

Tip:
  • If using the Custom Application workflow, the default color indicator will be displayed in the Admin Portal.
    • This can be changed by selecting Logo under Display Option in the General Info tab of the application configuration.
  • If using the OIDC template from the dropdown, the default Custom OIDC App logo will be displayed in the Admin Portal.
  1. Click Next and then Configure Application.
  2. In the SSO tab, the following window will appear.

Endpoint Configuration

  1. Grant Types:
    • Authorization Code is checked by default and cannot be deselected
    • Refresh Token can be checked at a later time if you wish to refresh your connector's token
  2. Enter one or multiple Redirect URIs (Uniform Resource Identifier) with the value(s) supplied by the RP.
    • Click +Add URI to add more than one URI
  3. Select the appropriate Client Authentication Type:
    • Client Secret POST - the client authorizes itself providing the secret in the HTTP request body as a form parameter
    • Client Secret Basic - the simplest method of client authentication using client secrets. It is a method where an application uses the HTTP Basic Authentication Scheme to authenticate with the authorization server
    • Public (None PKCE) - Client authentication set to none and with the use of Proof Key of Code Exchange (PKCE) was created as a secure substitute for the OAuth implicit flow, where the client receives access tokens as the result of authorization

Important:

The client authentication type will depend on what is supported by the RP.

  1. Enter the Login URL with the value supplied by the RP.

Attribute Mapping (optional)

  1. Add a Standard Scope by selecting Email or Profile.
  2. Add User and Constant attributes by clicking Add Attribute.
  3. Select include group attribute for claims/attributes that are required for your individual OIDC SSO needs. For more information about claims, see .

Note:

If the RP supports it, you can add more than what is required. 

  1. Under User ConsentAutomatically consent is selected by default and cannot be deselected.
  2. Click activate.
  3. If the client is not a public client, then a window will display the client secret.

Warning:

The client secret will only be displayed once. Copy and store the Client ID and Client Secret in a safe location, like a password manager.

  1. Click Got It.

Tip:

You can regenerate your client secret at any time.

To configure the RP

Enter the following information to the RP:

  • The application’s OIDC client ID
  • If the client is not public, the application’s OIDC client secret
  • ºÚÁϺ£½Ç91Èë¿Ú’s OIDC well-known config - https://oauth.id.jumpcloud.com/.well-known/openid-configuration

ºÚÁϺ£½Ç91Èë¿Ú Well-Known OpenID Configuration

  • https://oauth.id.jumpcloud.com/.well-known/openid-configuration
  • https://oauth.id.jumpcloud.com/.well-known/jwks.json

ºÚÁϺ£½Ç91Èë¿Ú OpenID Auth Endpoint

  • https://oauth.id.jumpcloud.com/oauth2/auth

ºÚÁϺ£½Ç91Èë¿Ú OpenID Issuer Endpoint

  • https://oauth.id.jumpcloud.com/

ºÚÁϺ£½Ç91Èë¿Ú OpenID Token Endpoint

  • https://oauth.id.jumpcloud.com/oauth2/token

ºÚÁϺ£½Ç91Èë¿Ú OpenID User Info Endpoint

  • https://oauth.id.jumpcloud.com/userinfo
Back to Top

Still Have Questions?

If you cannot find an answer to your question in our FAQ, you can always contact us.

Submit a Case