Skip to main content

Manage SSO Connections

On the Admin Portal Enterprise SSO menu, you can see the SSO Connections details.

Add SAML Connections

Once you've set up the SAML app on your Identity Provider, the Identity Provider will generate a SAML Metadata file.

The SAML metadata file contains information about the various SAML Authorities that can be used in SAML 2.0 protocol message exchanges.

Download the SAML Metadata file from your IdP and follow the below steps for adding the SAML connection.

  • Click the button New Connection.
  • Choose SAML as the type.
  • Give your new connection a name.
  • Add your Tenant (Eg: boxyhq.com) and Product (Eg: flex).
  • Add Allowed redirect URLs.
  • Add Default redirect URL.
  • Paste the Raw IdP XML.
  • If ForceAuthn is checked, it means that the user will be forced to re-authenticate at SAML IdP, even if they have an active session.
  • Click the button Save Changes.

Now you've successfully added your first SAML connection.

Add OIDC Connections

Once you've registered the OIDC app on your Identity Provider, the Identity Provider will generate a clientId and clientSecret.

The clientSecret will be used to authenticate the oidc client (in this case jackson) and obtain the access_token.

Also get the OpenID provider discovery endpoint (usually ending in /.well-known/openid-configuration) and follow the below steps for adding the OIDC connection.

  • Click the button New Connection.
  • Choose OIDC as the type.
  • Give your new connection a name.
  • Add your Tenant (Eg: boxyhq.com) and Product (Eg: flex).
  • Add Allowed redirect URLs.
  • Add Default redirect URL.
  • Enter the URL for OpenID Provider discovery which exposes the Provider Metadata.
  • Paste the clientId and clientSecret values into Client ID [OIDC Provider]/Client Secret [OIDC Provider] fields in the UI.
  • Click the button Save Changes.

Now you've successfully added your first OIDC connection.