Auth0 - OIDC - Configuration

circle-check

Required User Credentials

circle-check

Important Note

Overview

This guide explains how to integrate Auth0 using OpenID Connect (OIDC) with Flosum Cloud Apps to enable Single Sign-On (SSO) for seamless login.

circle-info

For more general instructions about adding an Identity Provider, see the following article.

circle-exclamation

Customer-Hosted

Outline Of Steps Involved

  • Configure Auth0 App

  • Add Callback URLs

  • Create an Identity Provider with Flosum Global Settings

  • Test the SSO

Configuring Auth0 for Flosum Cloud Apps

This section shows you how to configure an Auth0 Application to work with Flosum Cloud Apps for SSO.

circle-exclamation
1

Configure Application in Auth0

  1. Log in to your Auth0 account.

  2. Click Applications in the left sidebar, then click Applications.

  3. Click Default App to open the Default App screen.

  4. Copy the Domain, Client ID, and Client Secret values for creating an Identity Provider in Flosum Global Settings.

2

Add Callback URLs

  1. Click the Settings tab.

  2. In the Allowed Callback URLs field, add the URL of your region for each Flosum Cloud App you want to use with SSO. See the table below for the URLs for your region.

Flosum Cloud App
Callback URL

Global Settings

https://global-us.flosum.app/api/v1/auth/login/open-id

Backup & Archive

https://backup-us.flosum.app/api/v1/auth/login/open-id

DevOps

https://devops-us.flosum.app/api/v1/auth/login/open-id

Create Identity Provider In Global Settings

1

Create Identity Provider in Global Settings

Follow the general instructions in the article below to get started creating an OIDC Identity Provider.

  1. Complete the Basic information section.

    1. Select OPEN_ID for the identity provider Type.

  2. Complete the Button information section.

  3. (Optional) Complete the Group information section.

Complete OpenId Information Fields

Copy the information from your Auth0 application into the OpenId Information section. The table explains which Auth0 fields to enter into which Flosum Fields. The final screenshot shows a completed identity provider for an Auth0 ODIC application.

The Autho0 fields are found at: Auth0 -> Default App -> Settings -> Basic Information

Flosum Field
Auth0 Field

Client ID

Client ID

Client Secret

Client Secret

Issuer

https:// + Domain

2

Save and Test

circle-info

For instructions on logging in with SSO, see the following article.

  1. Click Save to save the identity provider.

  2. To test, open an incognito window.

  3. Start logging in to Global Settings with your tenant name.

  4. If the identity provider was configured successfully, you should see the SSO button you created.

circle-info

If, after entering your credentials, you encounter the error “IdP attribute given_name is undefined”, add the following attributes to the user in your Auth0 account.

  • given_name

  • family_name

Auth0 - Create User and Add Attributes

If you are receiving an error when attempting to log into Backup & Archive with your Auth0 credentials, you need to create a user and add the given_name and family_name attributes to that user.

1

Create User and Add Attributes

circle-info

If you are an existing user, you can add attributes by skipping steps 1 and 2 in this section.

  1. From your Auth0 account, click User Management in the left sidebar, then click Users.

  2. Click Create User and fill out the required fields.

  3. Open your user and click the Raw JSON tab.

  4. Make a note of your user_id, because you need it later in the process.

  5. Click Application in the left sidebar, then click APIs.

  6. Click Auth0 Management API.

  7. Click the Test tab.

  8. Click Create & Authorize Test Application.

  9. Click the API Explorer tab and click Create & Authorize Test Application.

  10. Make note of the Token, as you'll need it later in the process.

  11. Click Documentation at the top-right of your screen to open Auth0 Docsarrow-up-right.

  12. Click Auth0 APIs.

  13. Click Management API Explorer in the left sidebar.

  14. Click Users in the left sidebar, then click Update a user.

  15. Click Set API Token in the upper right of your screen, then paste the value of the previously saved token into the modal window for authorization.

  16. The Set API Token button should now read Authorized.

  17. Insert into path: id the user ID value you saved earlier, and delete all lines except given_name and family_name. Fill in the meaning of these lines as necessary.

  18. Click Test Endpoint.

  19. You must receive a Response code 200. If you do not receive a 200 response code, a message appears identifying the problem. Typical problems might be an incorrect token or user ID.

  20. Click Users in the left sidebar and click the Raw JSON tab. “given_name” and “family_name” should be added.

  21. Return to Flosum Backup & Archive and log in.

Last updated

Was this helpful?