Skip to main content

OIDC SSO

A SAML SSO Configuration defines the connection and trust settings between USP and an external Identity Provider (IdP), enabling Single Sign-On (SSO) for Users of the USP Admin UI.

info

To use an IdP, you must also create an OIDC SSO Mapping that references this Configuration and specifies how IdP attributes map to USP User fields (Username, Email, Name, and Role).

OIDC SSO Administration via USP Admin UI

Adding an OIDC SSO Configurations

info

Set up an IdP before creating a OIDC SSO configuration. At minimum, have the IdP's SSO URL and CA certificate ready.

To add an SAML SSO Configuration, follow these steps:

  1. From the Sidebar, click Authentication > SSO.
  2. Click OIDC.
  3. Click Add OIDC SSO.
  4. Complete the details for the new SAML SSO Configuration using the Field Descriptions table as a guide.
  5. Click Save.

Field Descriptions

NameDescriptionSpecificationsRequired
NameThe name of the SAML SSO Configuration.Yes
DescriptionThe description of the SAML SSO Configuration.No
Issuer URLThe base URL of the IdP. This value is used to discover OIDC endpoints and to validate the iss (issuer) claim in received ID tokensMust be a valid HTTPS URL.Yes
Authorization EndpointThe endpoint for initiating the authentication flow.Must be a valid HTTPS URL.Yes
User Info Endpoint URLThe URL of the OIDC endpoint used to retrieve additional user profile information. Must be a valid HTTPS URL.Yes
Token EndpointThe endpoint for exchanging the authorization code for tokens.Must be a valid HTTPS URL.Yes
Client IDThe unique identifier assigned to the Service Provider (USP) by the IdP.Yes
Client SecretThe authentication password for OIDC / OAuth. The SP Client Secret is issued to your application for authentication to the Token Endpoint.It's considered confidential data and not displayed after saving.No
ScopesThe permissions the SP Client is requesting, such as openid email profile.Must be a valid, space-separated string.Yes

Editing an SAML SSO Configuration

To edit an SAML SSO Configuration, follow these steps:

  1. From the Sidebar, click Authentication > SSO.
  2. Click OIDC.
  3. Click the Name of the SAML SSO Configuration you want to edit.
  4. Click the Edit button above the SAML SSO Configuration details.
  5. Edit the details of the SAML SSO Configuration using the Field Descriptions table as a guide.
  6. Click Save.
warning

If you modify a SAML SSO Configuration that is currently in use by a USP Server instance, the changes will not take effect until you manually apply the updated configuration by pushing it to the server. To apply the changes:

  1. Navigate to Monitoring > Status.
  2. Click the Name of the associated USP Server instance.
  3. Go to the Configuration tab.
  4. Review the pending changes in the Updated Configuration column.
  5. If the changes are correct, click Push Configuration.

OIDC SSO Configuration Metadata

SAML SSO Configuration details include all parameters given in the Field Descriptions table, plus the following read-only metadata:

NameDescription
IDUniversally Unique Identifier of this SAML SSO Configuration.
CreatedDate and time this SAML SSO Configuration was created.
UpdatedDate and time this SAML SSO Configuration was last updated.

Enabling/Disabling an OIDC SSO Configuration

OIDC SSO configurations can be Enabled or Disabled to control whether they can be used for User authentication. By default, new Configurations are Enabled, but their status can be changed at any time.

  • Enabled (default): The provider is active and available for authenticating Users.
  • Disabled: The provider is inactive, and Users associated with it will be unable to log in.

To enable or disable an SSO provider, follow these steps:

  1. From the Sidebar, click Authentication > LDAP.
  2. Click OIDC.
  3. Click the Name of the SAML SSO Configuration you want to enable/disable.
  4. Click the Enable or Disable button above the SSO provider details, depending on the current status.
info

Disabling an SAML SSO Configuration blocks new login attempts for associated Users. Existing sessions remain active until they expire or the User logs out.

Deleting an OIDC SSO Configuration

Deleting an SAML SSO Configuration is straightforward; however, you must plan what to do with any orphaned Users that have already been provisioned via the provider. Those options include:

OptionWhen to ChooseResult
Manually delete the UsersNo plans to migrate to a new provider, or don't want to preserve Users records.Users are removed from USP; if they authenticate later via an active SSO provider, they will be re-provisioned.
Migrate the Users to a new providerYou are moving to a different IdP and want to preserve existing User records.Update each User's login method metadata to associate them with the new SSO provider; Users continue to log in without interruption.
Retain as orphanedYou need the records for auditing but do not want Users to log in.Users remain visible but cannot authenticate; even with a new provider configured, their usernames remain tied to the deprecated provider.

To delete an SAML SSO Configuration, follow these steps:

  1. From the Sidebar, click Authentication > LDAP.
  2. Click OIDC.
  3. Click the Name of the SAML SSO Configuration you want to delete.
  4. Click the Delete button above the SAML SSO Configuration details.
  5. You will be asked to confirm the deletion. Click Delete.
warning

USP Manager prevents deletion of an SAML SSO Configuration if it is currently referenced by an OIDC SSO Mapping.

Additionally, if the SAML SSO Configuration is used by a USP Server instance, the updated configuration must be manually applied. To apply the changes:

  1. Navigate to Monitoring > Status.
  2. Click the Name of the associated USP Server instance.
  3. Go to the Configuration tab.
  4. Review the pending changes in the Candidate Configuration - Preview section.
  5. If the changes are correct, click Push Configuration.

The changes do not take effect on the server until this step is completed.