TABLE OF CONTENTS
- Introduction
- Contact CSM
- Set up your identity provider
- Complete the configuration
- Test the configuration
- Confirm success
Introduction
Having a Single Sign-On (SSO) integration using the OpenID Connect (OIDC) protocol allows users to access Collegial application with a single set of credentials.
This guide provides step-by-step instructions on how to configure OIDC SSO integration.
Contact CSM
Notify your CSM and Collegial Support that you wish to initiate the SSO process.
During the first meeting you will need to establish:
- Communication channel - ensure that Collegial has an effective way to communicate with relevant stakeholders. That might be either in a Slack channel, a Teams channel or via email.
- IT Team’s SSO Contact(s)
- Testing flow - decide on how you are going to test the SSO flow.
- Timeline of the implementation
Your CSM and Collegial support will provide you with the following metadata:
- Callback URL
Set up your identity provider
To allow users to log in using an OIDC Identity Provider, you must register your application with the identify provider (IdP). The process of doing this varies depending on the OIDC Identity Provider.
During this process, your OIDC Identity Provider will generate a unique identifier for the registered API, usually called a Client ID or an Application ID.
Please collect and exchange the following metadata provided by your IdP:
- Issuer URL - URL where you can find the OpenID Provider Configuration Document, which should be available in the
/.well-known/openid-configurationendpoint - Client Id - Unique identifier for your registered application
Complete the configuration
After receiving metadata, Collegial completes the configuration on the platform. This usually takes up to two days.
Test the configuration
Once configured, perform a test authentication to ensure that the OIDC connection is working as expected. Verify that users can authenticate to your application using their IdP credentials.
In case of any questions, Collegial will diligently monitor the newly established SSO connection, offering assistance with monitoring and troubleshooting as needed.
Confirm success
Time to celebrate! Your SSO configuration is ready for use!
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article