SSO Provider Setup Guide
Overview
This guide provides step-by-step instructions for setting up common SSO providers with Lager Guru.
Table of Contents
Azure AD (Microsoft Entra ID)
OIDC Configuration
Register Application in Azure AD
- Go to Azure Portal → Azure Active Directory → App registrations
- Click "New registration"
- Name: "Lager Guru"
- Supported account types: Select appropriate option
- Redirect URI:
https://your-domain.com/auth/callback/oidc?provider_id={provider_id}&tenant_id={tenant_id}
Get Application Credentials
- Note the Application (client) ID
- Go to "Certificates & secrets" → Create a new client secret
- Copy the Value (not the Secret ID) - this is your client secret
Get OIDC Endpoints
- Go to "Endpoints" in your app registration
- Copy the OpenID Connect metadata document URL
- Format:
https://login.microsoftonline.com/{tenant-id}/v2.0/.well-known/openid-configuration
Configure in Lager Guru
- Type: OpenID Connect (OIDC)
- Issuer:
https://login.microsoftonline.com/{tenant-id}/v2.0 - Client ID: Your Application (client) ID
- Client Secret: Your client secret value
- Metadata URL: The OpenID Connect metadata document URL
- Scopes:
openid profile email
SAML Configuration
Register Enterprise Application
- Go to Azure Portal → Azure Active Directory → Enterprise applications
- Click "New application" → "Non-gallery application"
- Name: "Lager Guru"
Configure Single Sign-On
- Go to "Single sign-on" → "SAML"
- Basic SAML Configuration:
- Identifier (Entity ID): Your Lager Guru Service Provider Entity ID
- Reply URL (Assertion Consumer Service URL):
https://your-domain.com/auth/callback/saml?provider_id={provider_id}&tenant_id={tenant_id}
Get SAML Metadata
- Download the "Federation Metadata XML" or use the "App Federation Metadata Url"
Configure in Lager Guru
- Type: SAML 2.0
- Issuer: Entity ID from Azure AD
- Client ID: Your Lager Guru Service Provider Entity ID
- Metadata URL: App Federation Metadata Url from Azure AD
Okta
OIDC Configuration
Create Application
- Go to Okta Admin → Applications → Applications
- Click "Create App Integration"
- Sign-in method: OIDC - OpenID Connect
- Application type: Web Application
- Grant types: Authorization Code, Refresh Token
- Sign-in redirect URIs:
https://your-domain.com/auth/callback/oidc?provider_id={provider_id}&tenant_id={tenant_id}
Get Credentials
- Client ID: Found in the "General" tab
- Client Secret: Found in the "General" tab (click "Show client secret")
Get OIDC Endpoints
- Go to "Settings" → "API" → "Authorization Servers"
- Copy the "Issuer" URL
- Metadata URL:
{issuer}/.well-known/openid-configuration
Configure in Lager Guru
- Type: OpenID Connect (OIDC)
- Issuer: Your Okta issuer URL
- Client ID: Your Okta client ID
- Client Secret: Your Okta client secret
- Metadata URL: The OpenID Connect metadata URL
- Scopes:
openid profile email
SAML Configuration
Create Application
- Go to Okta Admin → Applications → Applications
- Click "Create App Integration"
- Sign-in method: SAML 2.0
- App name: "Lager Guru"
Configure SAML Settings
- Single sign-on URL:
https://your-domain.com/auth/callback/saml?provider_id={provider_id}&tenant_id={tenant_id} - Audience URI (SP Entity ID): Your Lager Guru Service Provider Entity ID
- Name ID format: EmailAddress
- Application username: Email
- Single sign-on URL:
Get SAML Metadata
- Go to "Sign On" tab → "View SAML setup instructions"
- Copy the "Identity Provider metadata" URL or download the XML
Configure in Lager Guru
- Type: SAML 2.0
- Issuer: Entity ID from Okta
- Client ID: Your Lager Guru Service Provider Entity ID
- Metadata URL: Identity Provider metadata URL from Okta
Auth0
OIDC Configuration
Create Application
- Go to Auth0 Dashboard → Applications → Applications
- Click "Create Application"
- Name: "Lager Guru"
- Type: Regular Web Application
Configure Application
- Allowed Callback URLs:
https://your-domain.com/auth/callback/oidc?provider_id={provider_id}&tenant_id={tenant_id} - Allowed Logout URLs:
https://your-domain.com/auth/logout
- Allowed Callback URLs:
Get Credentials
- Client ID: Found in the "Settings" tab
- Client Secret: Found in the "Settings" tab
Get OIDC Endpoints
- Issuer:
https://{your-domain}.auth0.com/ - Metadata URL:
https://{your-domain}.auth0.com/.well-known/openid-configuration
- Issuer:
Configure in Lager Guru
- Type: OpenID Connect (OIDC)
- Issuer: Your Auth0 domain
- Client ID: Your Auth0 client ID
- Client Secret: Your Auth0 client secret
- Metadata URL: The OpenID Connect metadata URL
- Scopes:
openid profile email
Keycloak
OIDC Configuration
Create Client
- Go to Keycloak Admin Console → Clients → Create
- Client ID: "lager-guru"
- Client Protocol: openid-connect
- Access Type: confidential
Configure Client
- Valid Redirect URIs:
https://your-domain.com/auth/callback/oidc?provider_id={provider_id}&tenant_id={tenant_id} - Web Origins:
https://your-domain.com
- Valid Redirect URIs:
Get Credentials
- Go to "Credentials" tab
- Client ID: The client ID you created
- Client Secret: The secret shown in the "Credentials" tab
Get OIDC Endpoints
- Issuer:
https://{keycloak-server}/realms/{realm-name} - Metadata URL:
https://{keycloak-server}/realms/{realm-name}/.well-known/openid-configuration
- Issuer:
Configure in Lager Guru
- Type: OpenID Connect (OIDC)
- Issuer: Your Keycloak realm issuer URL
- Client ID: Your Keycloak client ID
- Client Secret: Your Keycloak client secret
- Metadata URL: The OpenID Connect metadata URL
- Scopes:
openid profile email
Generic OIDC Provider
For any OIDC-compliant provider:
Obtain Provider Information
- Issuer URL: Base URL of your OIDC provider
- Client ID: Your application's client identifier
- Client Secret: Your application's client secret
- Metadata URL:
{issuer}/.well-known/openid-configuration
Configure Redirect URI
- In your OIDC provider, add redirect URI:
https://your-domain.com/auth/callback/oidc?provider_id={provider_id}&tenant_id={tenant_id}
- In your OIDC provider, add redirect URI:
Configure in Lager Guru
- Type: OpenID Connect (OIDC)
- Issuer: Your OIDC provider's issuer URL
- Client ID: Your client ID
- Client Secret: Your client secret
- Metadata URL: Your OIDC discovery endpoint
- Scopes:
openid profile email(or as required by your provider)
Generic SAML Provider
For any SAML 2.0-compliant provider:
Obtain Provider Information
- Entity ID / Issuer: Your SAML identity provider's entity ID
- Metadata URL: URL where your SAML provider publishes metadata
Configure Service Provider Settings
- In your SAML provider, configure:
- Entity ID: Your Lager Guru Service Provider Entity ID
- ACS URL:
https://your-domain.com/auth/callback/saml?provider_id={provider_id}&tenant_id={tenant_id} - Name ID Format: EmailAddress (recommended)
- In your SAML provider, configure:
Configure in Lager Guru
- Type: SAML 2.0
- Issuer: Your SAML provider's entity ID
- Client ID: Your Lager Guru Service Provider Entity ID
- Metadata URL: Your SAML provider's metadata URL
Testing
After configuration:
- Go to the login page
- Click "Mit Unternehmens-SSO anmelden"
- You should be redirected to your SSO provider
- After authentication, you should be redirected back and signed in
Support
For provider-specific issues, consult your identity provider's documentation or contact support.