What is the OpenID Connect EAP? | Community
Skip to main content

What is the OpenID Connect EAP?

  • March 4, 2024
  • 3 replies
  • 0 views

Caroline13

OpenID Connect EAP allows you to set up SSO using OpenID Connect. You'll be able to set it up as a SSO configuration, the same as with SAML and JWT. 

Getting started

Once you've gotten the email confirmation that your account has been enrolled in the OpenID Connect EAP; you’ll see a new SSO configuration option for OpenID Connect under the Create SSO configuration dropdown. SSO configurations are created in Admin Center, under Account > Security > Single Sign-on.

 

Configuring OpenID Connect as a method for SSO

On the Create OpenID Connect configuration page you’ll see the required and optional fields needed for creating your SSO configuration using OpenID Connect (shortened “OIDC”). The information needed is going to come from the Identity Provider (shortened “IdP”) you're using, so make sure you have that set up before filling out this configuration form.

Filling out the configuration form

  • Configuration name

Give your configuration a unique name that makes it easy to identify in the list of configurations on the Single Sign-on tab.

  • IP ranges

Optionally, you can add a list of IP ranges. Requests from these IP ranges will always be routed via remote authentication. Requests from IP addresses outside these ranges will be routed to the normal sign-in form. To route all requests through remote authentication, leave this blank. 

  • Client ID

You’ll get this from your IdP, paste it in here. 

  • Client secret

Your IdP might require this, if so then paste it in here. As this is a secret that must be kept confidential at all times, you won’t see the full secret again after the configuration has been saved. If you need to rotate the secret, you can select the Edit button in the configuration form, which will allow you to add and save a new secret.

  • Scopes

Here you can list all the scopes you want to request from the IdP, at a minimum you must add openid. Any additional scopes are separated with a comma, for example; openid,email,phone

  • Supported scopes within the OIDC standard include; openid, profile, email, address, phone. You can also list any custom scopes that have been configured in your IdP.  
    • Unaccepted scopes that your IdP rejects will cause login to fail with a login error saying Unknown error during sign-in. We don’t currently validate any of the scopes in this field.
  • Turn on auto discovery

Check this box if you only want to provide the Issuer URL and we’ll extract the configuration details from the OIDC Configuration Document automatically.

  • If you check this box, you only need to configure Issuer URL and Authentication mode

Uncheck this box if you manually want to provide all the information that’s otherwise automatically extracted from the Issuer URL.

  • If you uncheck this box, you need to configure Issuer URL, UserInfo URL, JWKs URL, Authorization URL, Access URL and Authentication mode
  • Issuer URL

Also known as the issuer identifier. This URL is a unique identifier for the IdP that performs user authentication and delivers the ID tokens. 

  • UserInfo URL

This is an endpoint provided by the IdP that, when accessed with a valid access token, returns claims about the authenticated user.

  • JWKs URL

This is an endpoint provided by the IdP that allows us to retrieve the provider's public keys. These keys are used to verify the signature of JSON web tokens (JWTs) that the IdP issues.

  • Authorization URL

When the user accesses this URL, they are prompted to log in and consent to the requested scopes. 

  • Access URL

Also known as the token endpoint URL. It’s used to exchange an authorization code, client ID, and client secret for an access token. 

  • Authentication mode

PKCE: Recommended. Choose this option if you want the access token to be obtained using PKCE. This is best for public clients, like mobile or Javascript web apps, by using dynamically generated keys to prevent unauthorized token exchange without needing a client secret.

Authorization code flow: Choose this option if you want the access token to be obtained using Authorization code flow. This is best for server-based apps with secure back-end storage that rely on a client secret to obtain tokens. 

  • Show button when users sign in

Check this box if you let users choose how they sign in and want this configuration to be an option that they can choose from. If you check this box, you also need to give the button a name that will be shown on the Zendesk sign-in page. 

Uncheck this box if your users only sign in using an identity provider. You don't have to add an SSO button in that case because your users don't use the Zendesk sign-in page.

 

After you’ve finished creating a SSO configuration for OpenID Connect, you can assign it as an SSO method for team members (under Security > Team member authentication) or end users (under Security > End user authentication). You can manage all your SSO configurations under Account > Security > Single Sign-on.

3 replies

Mehdia
  • August 28, 2024

Hello team,

 

We cannot see the OpenID Connect option as an SSO configuration. We have already created a configuration on Sandbox, but we cannot update it; any changes we make revert to the previous version. Additionally, we are encountering an IP restriction error while testing the existing configuration, even though the IP restriction option is disabled.

 

Both our applications are registered in the Early Access Program (EAP), but we still face these issues. Could you please troubleshoot it? 

 

Thank you.


Caroline13
  • Author
  • August 28, 2024

This was a result of the EAP being officially closed, it's now been resolved for you. 


Mehdia
  • August 28, 2024

Thank you!