Configuring OpenID connect

This guide is the second step for adding SSO to your Frontegg application so that users can sign in using their OpenID Connect credentials.

  1. Enable OpenID Connect in Login Box
  2. πŸ‘‰ Configure OpenID Connect πŸ‘ˆ
  3. Enable SSO for Admin Portal
  4. Configure customer identity provider

Read below to learn how to configure SSO for the OpenID Connect standard.


Before configuring OpenID Connect, enable it in the Portal.

Configure OpenID in Frontegg Portal

Go to Environments ➜ [NAME OF ENVIRONMENT] ➜ Authentication ➜ SSO.


For instance, go to the development environment at Environments ➜ Development ➜ Authentication ➜ SSO

After clicking the OpenID Connect manage button, complete the form on the following page.


Redirect URL

The user is redirected to this URL after completing the operation flow. Make it the URL in your application that you want your user to land on after Frontegg completes the OpenID Connect authentication.

If you are using the Hosted Login method, add the Redirect URL as https://[your-frontegg-domain][your-application-url].

If you are using the Embedded Login method, add the Redirect URL as [your-application-url]/account/oidc/callback i.e. http://localhost:3000/account/oidc/callback


Moving Environments

When moving a project from one environment to another, Frontegg moves the SSO environment configurations for you. For instance, if moving from development to production, Frontegg moves the development SSO configurations to production.

Next Step: Configure customer identity provider

After configuring OpenID Connect in the Frontegg Portal, make sure you enable SSO for the Admin Portal so that users can access their SAML settings in the Admin Portal.

  1. Enable OpenID Connect in Login Box
  2. Configure SAML and OpenID Connect
  3. πŸ‘‰ Enable SSO for Admin Portal πŸ‘ˆ
  4. Configure customer OpenID Connect identity provider