You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
3. Add the Redirect URI to the **Allowed Callback URLs**.
140
137
141
-

138
+

142
139
143
140
13. Add more Redirect URIs if needed.
144
141
{% endtab %}
@@ -152,6 +149,48 @@ The **alias** must be unique across different login providers in the same enviro
152
149
{% endtabs %}
153
150
154
151
### How to fill in the External Login Provider Configuration
152
+
Learn about what type of data and information you need for each field in the configuration form.
153
+
154
+
**Display Name**
155
+
156
+
A Friendly name for the Login Provider
157
+
158
+
**Alias (required)**
159
+
160
+
A unique alias for the provider in the Organization.
161
+
Use only lower-case.
162
+
Spaces are not allowed.
163
+
164
+
**Client Id (required)**
165
+
166
+
A unique Client ID generated in the external login provider.Entra ID: Guid<br>Auth0: Random characters<br>Google: <code>{randomchars}.apps.googleusercontent.com</code>
167
+
168
+
169
+
**Client Secret (required)**
170
+
171
+
A secret that is generated in the External Login Provider and is associated with the Client Id.
172
+
173
+
174
+
**Authority (required)**
175
+
176
+
The URL for the External Login Provider. This can be found in the External Login Provider.
If you need a special metadata address for your External Login Provider, you can set it here. By default, the system will resolve the metadata address from the Authority Url, which is why this property is optional.
185
+
186
+
A common scenario for using a special metadata address is when working with Entra ID and configuring claims mapping. In this case, you must set the metadata address to the following:<code>https://login.microsoftonline.com/{tenant}/v2.0/.well-known/openid-configuration?appid={client-id}</code>
187
+
188
+
**User Mapping Claim Name**
189
+
190
+
Your provider may assign users to specific roles (For example: Admin, Editor, Viewer).<br><br>The <strong>User Group Claim Name</strong> is the field in the authentication token (claim) that identifies these roles. The system reads this claim to determine a user’s permissions.
191
+
192
+
Example: If your provider sends roles in a claim named <code>user_roles</code>, you would set the <strong>User Group Claim Name</strong> to <code>user_roles</code> so the system can properly recognize user permissions.
193
+
155
194
156
195
157
196
## Project Configurations
@@ -203,8 +242,8 @@ There is audit log for each Login Provider. Keep in mind that if you remove the
203
242
204
243
We are listing the following types of audit:
205
244
206
-
| Type | Sub-Type | Description |
207
-
|---|---|
245
+
| Type | Sub-Type | Description |
246
+
|---|---|---|
208
247
| User Sign-ins | - | See information about Project Permissions evaluated at the Sign-in. |
209
248
| External Login Providers | Added and Updated | Entries includes the changed properties. The Client Secret is always redacted. |
210
249
| Project Configuration | Added, Updated and Deleted | Shows information on the changed properties and stored Role mapping options |
0 commit comments