Skip to content

Commit 913dde9

Browse files
authored
Article validation, removed obj-c and swift from api calls, update placeholder vars (#578)
1 parent 786cbdd commit 913dde9

File tree

2 files changed

+85
-309
lines changed

2 files changed

+85
-309
lines changed

main/docs/authenticate/identity-providers/enterprise-identity-providers/oidc.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
description: Learn how to connect to OpenID Connect (OIDC) Identity Providers using an enterprise connection.
33
title: Connect to OpenID Connect Identity Provider
4-
validatedOn: 2026-02-04
4+
validatedOn: 2026-02-06
55
---
66
import {AuthCodeBlock} from "/snippets/AuthCodeBlock.jsx";
77

@@ -28,7 +28,7 @@ To connect your application to an OIDC <Tooltip tip="Identity Provider (IdP): Se
2828

2929
To allow users to log in using an OIDC Identity Provider, you must register your application with the IdP. The process of doing this varies depending on the OIDC Identity Provider, so you will need to follow your IdP's documentation to complete this task.
3030

31-
Generally, you will want to make sure that at some point you enter your callback URL: `https://{yourDomain}/login/callback`.
31+
Generally, you will want to make sure that at some point you enter your callback URL: `https://{YOUR_AUTH0_DOMAIN}/login/callback`.
3232

3333
<Card title="Find your Auth0 domain name for redirects">
3434

@@ -46,7 +46,7 @@ During this process, your OIDC Identity Provider will generate a unique identifi
4646

4747
## Create an enterprise connection in Auth0
4848

49-
Before you configure a OIDC Enterprise Connection in Auth0, ensure you have the **Application (client) ID** and the **<Tooltip tip="Client Secret: Secret used by a client (application) to authenticate with the Authorization Server; it should be known to only the client and the Authorization Server and must be sufficiently random to not be guessable." cta="View Glossary" href="/docs/glossary?term=Client+secret">Client secret</Tooltip>** generated when you set up your app in the OIDC provider.
49+
Before you configure a OIDC Enterprise Connection in Auth0, ensure you have the **Application (Client) ID** and the **<Tooltip tip="Client Secret: Secret used by a client (application) to authenticate with the Authorization Server; it should be known to only the client and the Authorization Server and must be sufficiently random to not be guessable." cta="View Glossary" href="/docs/glossary?term=Client+secret">Client Secret</Tooltip>** generated when you set up your app in the OIDC provider.
5050

5151
### Create an enterprise connection using the Auth0 Dashboard
5252

@@ -56,7 +56,7 @@ To be configurable through the Auth0 Dashboard, the OpenID Connect (OIDC) Identi
5656

5757
</Warning>
5858

59-
1. Navigate to [Auth0 Dashboard > Authentication > Enterprise](https://manage.auth0.com/#/connections/enterprise), locate **Open ID Connect**, and click its `+`.
59+
1. Navigate to [Auth0 Dashboard > Authentication > Enterprise](https://manage.auth0.com/#/connections/enterprise), locate **Open ID Connect**, and select **Create**.
6060

6161
<Frame>![Dashboard - Connections - Enterprise](/docs/images/cdy7uua7fh8z/1fSTcrZpkgkPR64NnI1lr8/b3454e60a4463e99353603fd11a71983/Enterprise_Connections_-_EN.png)</Frame>
6262

0 commit comments

Comments
 (0)