Authentication and Single Sign-On (SSO)

In this section, we’ll see how to configure Google and Microsoft Azure Single-sign on (SSO) on your server. We’ll also see how to configure Okta, PingFederate, or any other authentication provider that supports the Open ID Connect protocol.

With this feature enabled, end users would be able to use their IDs with third-party authentication providers mentioned above to log in to Seclore. 

Setting up Google single-sign on

Click on the Configuration > Authentication and SSO tab. 

Click Google.

Setting up Microsoft Azure single-sign on

Click on the Configuration > Authentication and SSO tab. 

Click Microsoft Azure.

Click the switch against Status to enable Microsoft Azure SSO. 

Enter the following details.

Next, you can also select the repositories for which this feature will be enabled. 

Click Save to save your changes.

 Setting up Okta

Click on the Configuration > Authentication and SSO tab. 

Click Okta.

Setting up PingFederate

Click on the Configuration > Authentication and SSO tab. 

Click PingFederate.

Setting up other OpenID Connect applications

You can also set up other out-of-the-box applications or any custom application that supports OpenID Connect.

Click on the Configuration > Authentication and SSO tab. 

Click Other OpenID Connect.