External IdP Configuration - Auth0 OIDC/SAML2

External IdP Configuration - Auth0 OIDC/SAML2

 

Create Application

  • Log in to Auth0 to Auth0 Dashboard.
  • It is recommended to creating a new application which is specific OpenMethods use only.
  • Click Create Application button
  • Enter the desired Application name: For example: OpenMethods-SSO
  • Select Regular Web Application.
  • Click Create button.

Settings

  • Click the Settings tab and add the following
  • Enter the following URL in the Callback URLs text box.
  • Enter the following URL on the Allowed Logout URLs text box.

 

Copy the Required Values

  • FOR SAML2
  • Scroll to the bottom of the Settings page and expand the Advance Settings and click the Endpoints tab. 
  • Metadata URL is available under the SAML section.
  • Copy the Metadata URL
  • FOR OIDC
  • Client ID
  • Client Secret
  • Scroll to the bottom of the Settings page and expand the Advance Settings and click the Endpoints tab. 
  • Copy the OAuth Authorization URL
  • Copy the OAuth Token URL
  • OAuth Logout
  • this is not available in the Settings page.
  • Use this format - <Base URL from Authorization URL>/oidc/logout

 

Assign Users

  • No need to manually add users to the application.

Enable SAML2 Addon

  • Click the Addons tab
  • Select SAML2 by clicking the Radio button.
  • Click the Settings tab and 
  • Enter the logout callback URL in the logout section of the json block.
  • Scroll down to the bottom of the page and click Enable button and then Save button.

 // Scroll down to the logout section
 "logout": {
  "callback": "https://identity.openmethodscloud.com/sso/signout-callback",
  "slo_enabled": true
 },


    • Related Articles

    • External IdP Configuration - ADFS OIDC

      OpenMethods allows users to log in with a single sign-on (SSO) system using SAML 2.0. An identity provider (IDP) that supports SAML 2.0 can be set up in various ways, such as a self-hosted Active Directory Federation Services (ADFS) server. ADFS is a ...
    • External IdP Configuration - Azure AD OIDC/SAML2

      Add Application Click the App Registration located under the Azure Services. Click New Registration Enter Name - The suggested name is OpenMethods-SSO Select the appropriate account types. Redirect URI Select Web Enter ...
    • External IdP Configuration - PingOne OIDC

      Add Application Application → Click + sign. Enter Application Name - The suggested Name is OpenMethods-SSO-OIDC Enter Description. Click Application Type OIDC Web App Click the Save button. Edit configuration Select Response Type Code, Token, and ID ...
    • External IdP Configuration - Okta OIDC

      Create a new app integration. Go to Applications and click Create App Integration. On the Create a new app integration page: Select Sign-in method - OIDC - OpenID Connect Select Application Type - Web Application Click Next Enter the App Integration ...
    • External IdP Configuration - PingOne SAML2

      Add Application Click Applications from the left-side navigation section Click Applications + sign. Enter Application Name - The suggested Name is OpenMethods-SSO-OIDC Enter Description. Click Application Type SAML Application Click the Configure ...