Skip to main content

SSO via OIDC

Connecting Your OpenID Connect (OIDC) Provider to Inigo

Inigo allows you to integrate any OpenID Connect (OIDC) provider, such as Okta, Auth0, Azure AD, or Google Workspaces, to manage authentication for your organization. This integration ensures a seamless and secure Single Sign-On (SSO) experience, allowing users to authenticate using their existing identity provider while automatically enrolling them into your Inigo organization and enforcing predefined access controls.

Setting Up OIDC in Inigo

This guide will walk you through the process of configuring and enabling OIDC authentication for your organization in Inigo.

  1. Register Inigo as a Client Application

    • Navigate to your OIDC provider's admin console (e.g., Okta, Auth0, or Azure AD).
    • Create a new client application and note the Client ID and Client Secret.
    • Configure the redirect URI to: https://your-inigo-instance.com/oauth/callback.
  2. Configure the OIDC Provider in Inigo

    • Go to the Inigo.
    • Navigate to Organization > SSO.
    • Click Configure.
    • Enter the Client ID, Client Secret, and the provider’s Issuer URL.
  3. Configure Redirect URI

    • Grab the redirect URI printed in Inigo and configure it in your Client Application registration.
  4. Test and Enable OIDC Authentication

    • Save your configuration and try to login via the issued URL.
    • Verify that users are correctly authenticated.

Once configured, users will be able to sign in to Inigo seamlessly using their OIDC provider. See specific documentation for Microsoft Entra and Okta.