SSO - IT - Single Sign-On Application Setup for OIDC Identity Providers

Eric Biddle
Eric Biddle
  • Updated

 

The purpose of this article is to describe the steps involved, information needed, and order of operations to properly set up the OnBoard SSO application inside of your Identity Provider.  

This will cover OIDC setup methods.
Note: SAML is recommended and will also be a slightly less involved process setup. Please see this article to implement using SAML: IT - Single Sign-On Application Setup for SAML Identity Providers

 

OIDC Setup

 (only use this method if you cannot use SAML)

  1. Create a new OIDC SSO application in your Identity Provider using email as the User/Name ID format. 
  2. Share the following pieces of information with your organization’s OnBoard administrator, which will input that information into OnBoard:  
    • Authority (this is the Audience URI and is unique per provider) 
    • Client ID 
    • Client Secret
  3. After that, OnBoard’s team will have a few configuration pieces that they’ll process. 
  4. OnBoard will share back a redirection URL to plug back into the OIDC application in your IdP. 

Please view this article for more information on OnBoard’s SSO.

 

From the Admin side back in OnBoard:

mceclip0.png

  1. Log in to OnBoard and click on Settings in the left navigation
  2. Click on the Security tab at the top of the screen. 
  3. Click the toggle on the Enable SSO option.
    mceclip14.png

  4. This will expand the SSO options, you'll then want to click on "Set Domain."
    mceclip0.png


  5. Here you can enter the Sign-On Domain used for your SSO, and your Email Address, then click Next.
    mceclip2.png

  6. On the next screen you'll be prompted for an Authentication Code:
    mceclip3.png

  7. To get that, we'll just want to check the inbox of the email address we entered for the prior step, which should receive an Authentication Code in the email. Copy this code:
    mceclip4.png


  8. And paste into the Code box, or manually enter the code if copying and pasting won't work. Then click Next.
    mceclip5.png


  9. This will return us to the Enable SSO options, and we can now click the "Configure Provider" button.
    mceclip6.png

  10. Set the Authentication Framework to OIDC, and set your Provider in the Provider dropdown, then click Next.
    mceclip0.png

  11. Paste in the Authority/Audience URI from the Identity Provider side.
    mceclip1.png

  12. Enter the Display Name. This usually would be something related to your organization. 
    mceclip2.png

  13. Enter the OAuth Client ID into Client ID, the OAuth Client Secret in Client Secret, then click "Set Configuration."
    mceclip3.png

  14. If you would like to Enforce the SSO login for the organization, check the Enforce SSO for this organization option. 
    Important Note: Enforcing SSO for the organization will require ALL users to access the organization through their pre-existing SSO credentials. If they do not have an SSO account they will be unable to log in to the organization.
    mceclip23.png

  15. Share this article with your members to assist them with logging in with SSO: Logging in with Single Sign-On.

 

Was this article helpful?

0 out of 0 found this helpful

Have more questions? Submit a request

Comments

0 comments

Article is closed for comments.