OpenID Connect (OIDC) SSO Integration Guide
This guide provides a general overview and step-by-step instructions for configuring OpenID Connect (OIDC) authentication between Multi-Pass (IdP) and a third-party Service Provider (SP).
OIDC is a modern identity layer built on top of OAuth 2.0 that enables SPs to verify end-user identities via an external identity provider. This configuration allows for secure, federated login using standard protocols.
Make sure you have the following:
- Admin access to a Multi-Pass Dashboard
- Identified your deployment's tenant (we will refer to it as <TENANT_NAME>)
- Administrative access to your application (SP)
Your application acts as the Service Provider. Start by creating a new OIDC profile using the following information from Multi-Pass:
What Each Field Means
Discovery Endpoint URL
Provides metadata about the IdP including:
- Authorization, token, and userinfo endpoints
- Supported scopes, grant types, and public keys
Authorization URL
Redirects users to Multi-Pass for login and consent
User Info URL
Used to retrieve authenticated user profile data like:
- sub
- email
- preferred_username
Token URL
Used to exchange the authorization code for:
- id_token
- access_token
- (optionally) refresh_token
End Session URL
Used to terminate the user's session on the IdP side.
Multi-Pass offers two interfaces:
- The Advanced Console (Legacy)
- The Dashboard Interface (Recommended)
You’ll need the following from your Service Provider (SP):
- Redirect URI (e.g., https://yourapp.com/callback)
Steps to follow
- Log in to Multi-Pass Dashboard
- Navigate to your tenant
- Click on Advanced Console
- Click on Clients, then Create Client
- Choose OIDC as the client type
- Provide a Client Name, Redirect URI, and enable Client Authentication
Once the client is created, you'll receive:
- Client ID
- Client Secret
Understanding the OIDC Response
During the OIDC flow, you’ll interact with the following key parameters:
Parameter | Description |
---|
response_type | Usually code for Authorization Code Flow |
state | (Optional) Used to prevent CSRF attacks |
nonce | Recommended to protect against replay attacks
|
Flow Summary:
- Redirect the user to the authorization endpoint.
- Receive the authorization code via redirect URI.
- Exchange the code at the token endpoint for:
- access_token
- id_token
- (optional) refresh_token
Related Articles
ATERA - SSO configuration
This application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a step-by-step guide to ...
Drupal - SSO configuration
Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a ...
Mendix - SSO Configuration
This document has been tested and approved by Kelvin Zero Inc This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Mendix using Multi-Pass. SSO simplifies user authentication by allowing access to multiple ...
Outsystems (Apps) - SSO Configuration
This application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a step-by-step guide to ...
N-Central (N-Able) - SSO configuration
This application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a step-by-step guide to ...