OpenID Connect (OIDC) SSO Integration Guide
This guide provides a general overview and step-by-step instructions for configuring OpenID Connect (OIDC) authentication between Multi-Pass (IdP) and a third-party Service Provider (SP).
OIDC is a modern identity layer built on top of OAuth 2.0 that enables SPs to verify end-user identities via an external identity provider. This configuration allows for secure, federated login using standard protocols.
Make sure you have the following:
- Admin access to a Multi-Pass Dashboard
- Identified your deployment's tenant (we will refer to it as <TENANT_NAME>)
- Administrative access to your application (SP)
Your application acts as the Service Provider. Start by creating a new OIDC profile using the following information from Multi-Pass:
What Each Field Means
Discovery Endpoint URL
Provides metadata about the IdP including:
- Authorization, token, and userinfo endpoints
- Supported scopes, grant types, and public keys
Authorization URL
Redirects users to Multi-Pass for login and consent
User Info URL
Used to retrieve authenticated user profile data like:
- sub
- email
- preferred_username
Token URL
Used to exchange the authorization code for:
- id_token
- access_token
- (optionally) refresh_token
End Session URL
Used to terminate the user's session on the IdP side.
Multi-Pass offers two interfaces:
- The Advanced Console (Legacy)
- The Dashboard Interface (Recommended)
You’ll need the following from your Service Provider (SP):
- Redirect URI (e.g., https://yourapp.com/callback)
Steps to follow
- Log in to Multi-Pass Dashboard
- Navigate to your deployment
- Click on Advanced Console
- Click on Clients, then Create Client
- Choose OIDC as the client type
- Provide a Client Name, Redirect URI, and enable Client Authentication
Once the client is created, you'll receive:
- Client ID
- Client Secret
Understanding the OIDC Response
During the OIDC flow, you’ll interact with the following key parameters:
Parameter | Description |
---|
response_type | Usually code for Authorization Code Flow |
state | (Optional) Used to prevent CSRF attacks |
nonce | Recommended to protect against replay attacks
|
Flow Summary:
- Redirect the user to the authorization endpoint.
- Receive the authorization code via redirect URI.
- Exchange the code at the token endpoint for:
- access_token
- id_token
- (optional) refresh_token
Related Articles
Syncro - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Syncro using MPAS. SSO simplifies user authentication by allowing access to multiple ...
Odoo - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Odoo using MPAS. SSO simplifies user authentication by allowing access to multiple ...
Hubspot - SSO Configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for HubSpot using MPAS. SSO simplifies user authentication by allowing access to multiple ...
HaloPSA - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for HaloPSA using MPAS. SSO simplifies user authentication by allowing access to multiple ...
Google Workspace - SSO Configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Google Workspace and its suite using MPAS. SSO simplifies user authentication by allowing ...