Skip to content

SSO Configuration

The SSO Configuration page allows administrators to enable and configure Single Sign-On (SSO) using OpenID Connect (OIDC). When enabled, users authenticate through an external identity provider instead of local application credentials.

SSO configuration is available exclusively to administrators through the Admin panel.

  1. Navigate to the Admin panel from the user profile menu.

  2. Click the SSO Configuration tab.

  3. Toggle the SSO Active switch to enable Single Sign-On.

  4. Complete the OIDC configuration fields described below.

FieldDescription
Issuer URLThe OIDC provider’s issuer endpoint (e.g., https://accounts.google.com or your organization’s identity provider URL)
Client IDThe application client ID registered with the identity provider
Client SecretThe application client secret (encrypted at rest)
Redirect URIThe callback URL the identity provider redirects to after authentication
ScopesOIDC scopes requested during authentication (e.g., openid, profile, email)
Login Button LabelCustom text displayed on the SSO login button (e.g., “Sign in with Okta”)

The system validates the OIDC configuration by performing a discovery request against the issuer URL. The issuer must expose a valid /.well-known/openid-configuration endpoint. Validation occurs immediately when the configuration is saved.

  • Immediate effect: Changes to SSO settings apply immediately without requiring an application restart.
  • Encryption: Sensitive data, including the Client Secret, is encrypted at rest.
  • Persistence: SSO settings persist across application restarts.
  • Enforcement: When SSO is enabled, the login page displays both the local login form and an SSO button. Both authentication methods remain available in the UI.
  • Fallback: If no admin-configured SSO settings exist, the system falls back to environment-based OIDC configuration (environment variables).