Setting Up OneLogin Federated Single Sign-On (SSO)
In this page we will see the process of setting up OneLogin SSO with Codefresh. For the general instructions of SSO setup see the overview page.
Setting OneLogin as an Identity provider
To setup OneLogin for SSO do the following:
Step 1: Configure app on the OneLogin dashboard
Log in to the OneLogin Administration Dashboard, and click Apps > Add Apps.
Find the OpenId Connect App from the search field.
Setup a Codefresh application
Open the SSO tab to get the Client ID and client Secret
Make sure that Application Type is set to
Web and Token endpoint Authentication is set to
Note down the values as they will be used in the next section.
Step 2: Configure OneLogin app with Codefresh service provider settings
Go back into Codefresh and choose OneLogin at the SSO Settings
In the configuration screen fill in the following:
DISPLAY NAME- Friendly SSO name (arbitrary)
CLIENT ID- Use the value you got from the previous section
CLIENT SECRET- Use the value you got from the previous section
DOMAIN- domain to be used for authentication (optional, only for users that must connect via a custom domain)
API CLIEND ID- Used for team sync only. See the official documentation for details
API CLIENT SECRET- Used for team sync only. See the official documentation for details
After clicking SAVE you’ll see the generated Client Name:
Note this down.
Step 3: Setup Login and Redirect URI’s
Go back to the OneLogin dashboard.
Use the Client Name from the previous section to generate the Login Url and Redirect URI’s
- Example Client Name:
- Example Login Url:
- Example Redirect URI:
This concludes the SSO setup for OneLogin.
What to read next
See the overview page on how to test the integration, activate SSO for collaborators and create sync jobs.