Auth0 - Setting Up Identity Provider (SSO)
Overview
This guide explains how to integrate Auth0 with Flosum Cloud Apps to enable Single Sign-On (SSO) for seamless login.
Customer-Hosted
Customers who host Flosum Apps on their own infrastructure will have a custom URL for logging into their apps. When using this documentation, replace any Flosum Hosted URLs with your own URLs.
Outline Of Steps Involved
Configure Auth0 App
Add Callback URLs
Create an Identity Provider with Flosum Global Settings
Test the SSO
Configuring Auth0 for Flosum Cloud Apps
This section shows you how to configure an Auth0 Application to work with Flosum Cloud Apps for SSO.
Please note that the instructions for Auth0 Applications may not reflect the latest version. Some screens, field names, and steps might have changed.
Add Callback URLs
Click the Settings tab.
In the Allowed Callback URLs field, add the URL of your region for each Flosum Cloud App you want to use with SSO. See the table below for the URLs for your region.

Global Settings
https://global-us.flosum.app/api/v1/auth/login/open-id
Backup & Archive
https://backup-us.flosum.app/api/v1/auth/login/open-id
DevOps
https://devops-us.flosum.app/api/v1/auth/login/open-id
Global Settings
https://global-de.flosum.app/api/v1/auth/login/open-id
Backup & Archive
https://backup-de.flosum.app/api/v1/auth/login/open-id
DevOps
https://devops-ed.flosum.app/api/v1/auth/login/open-id
Global Settings
https://global-jp.flosum.app/api/v1/auth/login/open-id
Backup & Archive
https://backup-jp.flosum.app/api/v1/auth/login/open-id
DevOps
https://devops-jp.flosum.app/api/v1/auth/login/open-id
Global Settings
https://global-au.flosum.app/api/v1/auth/login/open-id
Backup & Archive
https://backup-au.flosum.app/api/v1/auth/login/open-id
DevOps
https://devops-au.flosum.app/api/v1/auth/login/open-id
Create Identity Provider In Global Settings
Create Identity Provider in Global Settings
Log in to Flosum Global Settings by following the instructions in the linked article.
Click Identity Providers from the sidebar menu.
Click Create.

Enter a Name for the identity provider.
Click the Type dropdown menu.

Select OPEN_ID.

Complete the OpenId Information section by copying the following fields from Auth0 -> Default App -> Settings -> Basic Information to the fields on the Create Identity Provider form.
Client ID
Client ID
Client Secret
Client Secret
https:// + Domain
Issuer
In the Button Text textbox, enter a label to be displayed on the login button on the login screen.
Click Save.

Log In to Flosum Cloud Apps Using Auth0
After configuring Auth0 and adding the Identity Provider, test your SSO implementation by logging in to Flosum Global Settings.
No SSO Button
If the SSO button you created with the Identity Provider is missing from the tenant login screen, there may be an issue with the provider details. Verify that the Identity Provider configuration matches the SSO credentials.
Open the Flosum Cloud App to log in.
Click Use tenant name.

Enter Tenant Name.

Click the SSO button created by your system administrator.

Complete the login with your SSO provider.

Auth0 - Create User and Add Attributes
If you are receiving an error when attempting to log into Backup & Archive with your Auth0 credentials, you need to create a user and add the given_name and family_name attributes to that user.
Create User and Add Attributes
From your Auth0 account, click User Management in the left sidebar, then click Users.
Click Create User and fill out the required fields.
Open your user and click the Raw JSON tab.
Make a note of your user_id, because you need it later in the process.
Click Application in the left sidebar, then click APIs.
Click Auth0 Management API.
Click the Test tab.
Click Create & Authorize Test Application.
Click the API Explorer tab and click Create & Authorize Test Application.
Make note of the Token, as you'll need it later in the process.
Click Documentation at the top-right of your screen to open Auth0 Docs.
Click Auth0 APIs.
Click Management API Explorer in the left sidebar.
Click Users in the left sidebar, then click Update a user.
Click Set API Token in the upper right of your screen, then paste the value of the previously saved token into the modal window for authorization.
The Set API Token button should now read Authorized.
Insert into path: id the user ID value you saved earlier, and delete all lines except given_name and family_name. Fill in the meaning of these lines as necessary.
Click Test Endpoint.
You must receive a Response code 200. If you do not receive a 200 response code, a message appears identifying the problem. Typical problems might be an incorrect token or user ID.
Click Users in the left sidebar and click the Raw JSON tab. “given_name” and “family_name” should be added.
Return to Flosum Backup & Archive and log in.
Last updated
Was this helpful?

