Skip to main content

Configuring an Identity Provider (OIDC)

Configuring an Identity Provider (OIDC)

Integrating an OpenID Connect (OIDC) Identity Provider (IdP) with Invariant Technology allows you to enable Single Sign-On (SSO) for your workspace. This centralizes user authentication through your existing IdP (e.g., Okta, Azure AD, Auth0), enhancing security and simplifying the login process for your users.

Prerequisite: Before you begin, you must have an application configured within your chosen Identity Provider specifically for Invariant Technology. From this IdP application configuration, you will need the following details:

  • Client ID
  • Client Secret
  • Provider Discovery URI (also known as OpenID Configuration URL, Discovery Endpoint, or .well-known/openid-configuration URL)

Adding an OpenID Connect (OIDC) Provider

  1. From Invariant Settings, navigate to the Identity Provider section (this might also be labeled "SSO," "OIDC Configuration," or similar).
  2. Click the Add OpenID Connect provider button.
    • A form for entering your IdP details will appear.
  3. In the form, provide the following information obtained from your Identity Provider's application configuration:
    • Custom Name: Enter a descriptive name for this IdP connection (e.g., "Okta Production," "Azure AD SSO"). This name is for your reference within Invariant Technology.
    • Client ID: Enter the Client ID.
    • Client Secret: Enter the Client Secret.
      • Note: Treat the Client Secret like a password; it is sensitive information.
    • Provider Discovery URI: Enter the full Discovery URI.
  4. Once all fields are correctly filled, click the Add Integration button (or Save Configuration, Connect).
    • Invariant Technology will attempt to connect to your IdP using the provided details.
    • Upon successful configuration, the IdP will be listed, and you may be able to set it as the default login method (refer to "Workspace Security Settings" for more details).
Animated UI walkthrough