Customer OpenID Connect

This guide explains how customers can configure their OpenID Connect settings with their identity provider.


πŸ“˜

First you must enable SAML in the Frontegg Portal and configure it.

Customer Configuration

If you enable and configure OpenID Connect in the Frontegg Portal, your customers can configure their settings to allow their users to sign in using OpenID Connect.

Here is how.

STEP 1: Selet OpenID Connect

Your customers need to login to your application, open the Admin Portal, and navigate to SSO page.

Then, the user will be able to choose Open ID Connect as IDP.


STEP 2: Provide Additional Data

Next, the user needs to provide additional data to login with OpenID Connect, as described in the table below.

Configuration

Description

Issuer URL

This is a URL that is given by the IDP. This URL provides instructions on how can we communicate with the IDP. If you are unsure you have the right URL, set it in the text input anyway, and we will let you know if it is okay.

Client ID

The clientId given by the IDP. This allows the IDP to identify who is requesting to authenticate.

Secret Key

The secret key lets us authenticate with the IDP to validate the user who tries to login. It must correspond to the secret key we have for the clientId.

Redirect URI

This is a pre-configured value that lets the IDP know where it should return the user after the user is authenticated in the IDP. The redirect URI value must be configured in the IDP itself.


After completing and saving all the configurations, the user should be able to login using the OpenID Connect protocol.


πŸ‘

Moving Environments

When moving a project from one environment to another, Frontegg moves the SSO environment configurations for you. For instance, if moving from development to production, Frontegg moves the development SSO configurations to production.


Did this page help you?