Auth0 - OIDC - Configuration
Important Note
The instructions in this article cover a third-party app and may not reflect the latest version. Please use these instructions as a guide to complete the task, but be aware that some screens, field names, and steps may have changed.
Overview
This guide explains how to integrate Auth0 using OpenID Connect (OIDC) with Flosum Cloud Apps to enable Single Sign-On (SSO) for seamless login.
For more general instructions about adding an Identity Provider, see the following article.
Customer-Hosted
Customers who host Flosum Apps on their own infrastructure will have a custom URL for logging into their apps. When using this documentation, replace any Flosum Hosted URLs with your own URLs.
Outline Of Steps Involved
Configure Auth0 App
Add Callback URLs
Create an Identity Provider with Flosum Global Settings
Test the SSO
Configuring Auth0 for Flosum Cloud Apps
This section shows you how to configure an Auth0 Application to work with Flosum Cloud Apps for SSO.
Please note that the instructions for Auth0 Applications may not reflect the latest version. Some screens, field names, and steps might have changed.
Add Callback URLs
Click the Settings tab.
In the Allowed Callback URLs field, add the URL of your region for each Flosum Cloud App you want to use with SSO. See the table below for the URLs for your region.

Global Settings
https://global-us.flosum.app/api/v1/auth/login/open-id
Backup & Archive
https://backup-us.flosum.app/api/v1/auth/login/open-id
DevOps
https://devops-us.flosum.app/api/v1/auth/login/open-id
Global Settings
https://global-de.flosum.app/api/v1/auth/login/open-id
Backup & Archive
https://backup-de.flosum.app/api/v1/auth/login/open-id
DevOps
https://devops-ed.flosum.app/api/v1/auth/login/open-id
Global Settings
https://global-jp.flosum.app/api/v1/auth/login/open-id
Backup & Archive
https://backup-jp.flosum.app/api/v1/auth/login/open-id
DevOps
https://devops-jp.flosum.app/api/v1/auth/login/open-id
Global Settings
https://global-au.flosum.app/api/v1/auth/login/open-id
Backup & Archive
https://backup-au.flosum.app/api/v1/auth/login/open-id
DevOps
https://devops-au.flosum.app/api/v1/auth/login/open-id
Create Identity Provider In Global Settings
Create Identity Provider in Global Settings
Follow the general instructions in the article below to get started creating an OIDC Identity Provider.
Complete the Basic information section.
Select OPEN_ID for the identity provider Type.
Complete the Button information section.
(Optional) Complete the Group information section.
Complete OpenId Information Fields
Copy the information from your Auth0 application into the OpenId Information section. The table explains which Auth0 fields to enter into which Flosum Fields. The final screenshot shows a completed identity provider for an Auth0 ODIC application.
The Autho0 fields are found at: Auth0 -> Default App -> Settings -> Basic Information
Client ID
Client ID
Client Secret
Client Secret
Issuer
https:// + Domain

Save and Test
For instructions on logging in with SSO, see the following article.
Click Save to save the identity provider.
To test, open an incognito window.
Start logging in to Global Settings with your tenant name.
If the identity provider was configured successfully, you should see the SSO button you created.


If, after entering your credentials, you encounter the error “IdP attribute given_name is undefined”, add the following attributes to the user in your Auth0 account.
given_namefamily_name
Auth0 - Create User and Add Attributes
If you are receiving an error when attempting to log into Backup & Archive with your Auth0 credentials, you need to create a user and add the given_name and family_name attributes to that user.
Create User and Add Attributes
If you are an existing user, you can add attributes by skipping steps 1 and 2 in this section.
From your Auth0 account, click User Management in the left sidebar, then click Users.
Click Create User and fill out the required fields.
Open your user and click the Raw JSON tab.
Make a note of your user_id, because you need it later in the process.
Click Application in the left sidebar, then click APIs.
Click Auth0 Management API.
Click the Test tab.
Click Create & Authorize Test Application.
Click the API Explorer tab and click Create & Authorize Test Application.
Make note of the Token, as you'll need it later in the process.
Click Documentation at the top-right of your screen to open Auth0 Docs.
Click Auth0 APIs.
Click Management API Explorer in the left sidebar.
Click Users in the left sidebar, then click Update a user.
Click Set API Token in the upper right of your screen, then paste the value of the previously saved token into the modal window for authorization.
The Set API Token button should now read Authorized.
Insert into path: id the user ID value you saved earlier, and delete all lines except given_name and family_name. Fill in the meaning of these lines as necessary.
Click Test Endpoint.
You must receive a Response code 200. If you do not receive a 200 response code, a message appears identifying the problem. Typical problems might be an incorrect token or user ID.
Click Users in the left sidebar and click the Raw JSON tab. “given_name” and “family_name” should be added.
Return to Flosum Backup & Archive and log in.
Last updated
Was this helpful?

