mirror of https://github.com/nocodb/nocodb
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
2.9 KiB
2.9 KiB
title | description | tags | keywords |
---|---|---|---|
Auth0 | Learn how to configure Auth0 as an identity provider for NocoDB. | [SSO Auth0 OIDC] | [SSO Auth0 OIDC Authentication Identity Provider] |
:::info For SSO Access - please reach out to sales team. :::
This article briefs about the steps to configure Auth0 as Identity service provider for NocoDB
NocoDB, Retrieve Redirect URL
- Go to
Account Settings
- Select
Authentication (SSO)
- Click on
New Provider
button - On the Popup modal, Specify a
Display name
for the provider; note that, this name will be used to display the provider on the login page - Retrieve
Redirect URL
; this information will be required to be configured later with the Identity Provider
Auth0, Configure NocoDB as an Application
- Access your Auth0 account
- navigate to
Applications
>Create Application
.
- navigate to
- In the
Create Application
modal,- choose
Regular Web Application
- click
Create
- choose
- On Quick start screen, go to
Settings
tab- Copy the
Client ID
andClient Secret
from theBasic Information
section.
- Copy the
- Goto
Application URIs
section- Add the
Redirect URL
copied from step(2) underAllowed Callback URLs
. Save Changes
- Add the
- On the
Settings
tab, go to theAdvanced Settings
section and click on theEndpoints
tab.- Copy the
OAuth Authorization URL
,OAuth Token URL
,OAuth User Info URL
&JSON Web Key Set URL
- Copy the
NocoDB, Configure Auth0 as an Identity Provider
- In NocoDB, open
Account Settings
>Authentication
>OIDC
. On the "Register OIDC Identity Provider" modal, insert the following information:- Insert
Client ID
retrieved in step (5) above asClient ID
- Insert
Client Secret
retrieved in step (5) above asClient Secret
- Insert
OAuth Authorization URL
retrieved in step (7) above asAuthorization URL
- Insert
OAuth Token URL
retrieved in step (7) above asToken URL
- Insert
OAuth User Info URL
retrieved in step (7) above asUserinfo URL
- Insert
JSON Web Key Set URL
retrieved in step (7) above asJWK Set URL
- Set
Scope
asopenid
profile
email
offline_access
- In the Username Attribute field, indicate the name of the claim that represents the user's email. The default value is set to "email."
- Insert
For Sign-in's, user should be able to now see Sign in with <SSO>
option.
:::note
Post sign-out, refresh page (for the first time) if you do not see Sign in with <SSO>
option
:::
For information about Auth0 API Scopes, refer here