Skip to main content
Configure OpenID Connect (OIDC) SSO connections for modern identity providers.

OIDC discovery

Use automatic discovery with issuer URL:
{
  "issuer": "https://idp.example.com",
  "clientId": "your-client-id",
  "clientSecret": "your-client-secret"
}

Manual configuration

Configure OIDC endpoints manually:
{
  "authorizationEndpoint": "https://idp.example.com/authorize",
  "tokenEndpoint": "https://idp.example.com/token",
  "userinfoEndpoint": "https://idp.example.com/userinfo",
  "jwksUri": "https://idp.example.com/.well-known/jwks.json",
  "clientId": "your-client-id",
  "clientSecret": "your-client-secret"
}

Scopes

Request OIDC scopes:
{
  "scopes": ["openid", "profile", "email"]
}

Claims mapping

Map OIDC claims to user profile:
{
  "claimsMapping": {
    "email": "email",
    "firstName": "given_name",
    "lastName": "family_name"
  }
}

Next steps

SSO connections

Manage SSO connections

SAML configuration

Configure SAML

Build docs developers (and LLMs) love