SSO
This guide is for the IdP engineer configuring trust with this broker.
Scope
Protocol supported:
OIDConly (Authorization Code flow).Client auth methods supported at token endpoint:
client_secret_postprivate_key_jwt(RS256 only)
Not supported:
SAMLOIDC implicit flow
client_secret_basicprivate_key_jwtalgorithms other thanRS256
What You Configure on Your IdP
For all IdPs (Entra ID, Okta, Auth0, Keycloak, etc):
Create an OIDC confidential client / app registration.
Add redirect URI:
https://sso.conducttr.app/api/sso/callbackEnsure Authorization Code flow is enabled.
Ensure PKCE (
S256) is allowed.Ensure ID token contains:
nonce(required)one stable user ID claim:
sub(oroidfor Entra)an email-like login claim:
emailpreferred,preferred_usernamefallbackConfigure token endpoint auth method as one of:
client_secret_postprivate_key_jwt
Integration Handoff by Auth Method
Option A: client_secret_post
client_secret_postWhat we need from you:
issuerdiscovery_urlclient_idclient_secretoptional requested scopes beyond default
What you need from us:
Redirect URI to register (
https://sso.conducttr.app/api/sso/callback)Any agreed scope/profile requirements from relying apps
Option B: private_key_jwt (RS256)
private_key_jwt (RS256)What we need from you:
issuerdiscovery_urlclient_idwhether
kidis required/enforced by your IdPoptional requested scopes beyond default
What you need from us:
Redirect URI to register (
https://sso.conducttr.app/api/sso/callback)Client public key/certificate (or JWK) and
kidfor registration in your IdP app
Constraints:
Signing algorithm must be
RS256.Broker builds
client_assertionwithiss=sub=client_id,aud=<token_endpoint>, short expiry, uniquejti.
Discovery
Please provide the Conducttr broker team with your discovery URL.
During the discovery phase, this is how the process proceeds:
Obtain the OpenID Connect configuration URL of your Identity Provider (IdP).
Verify the JSON Web Key Set (JWKS) endpoint to fetch public keys for signature validation.
Ensure the token endpoint and authorisation endpoint URLs are correct and accessible.
Confirm the
issuerin metadata corresponds to the expected URL of your IdP.Validate the supported signing algorithms, ensuring they include
RS256.Check for any custom claims that may need to be handled during token validation.
Ensure all discovery information aligns with the specifications for smooth integration and function of the SSO process.
Validation Checklist
IdP has exact redirect URI match.
Token endpoint auth method matches agreed method.
First login reaches
/api/sso/callbacksuccessfully.Token exchange succeeds at IdP token endpoint.
ID token validates and contains required claims (
nonce, user ID, email-like login).Browser returns to relying app with
ticket=....
Notes for Entra ID
oidis accepted as stable user identifier.preferred_usernameis accepted ifemailis absent.Coordinate issuer policy with the Conducttr broker team before launching multi-tenant/family issuer behavior.
Last updated
Was this helpful?