Configuring OIDC-based SSO

Enterprise

Single tenant AI Hub customers can use OpenID Connect (OIDC)-based authentication to manage AI Hub access. Using OIDC-based single sign-on (SSO) lets you leverage your organization’s existing SSO identity provider (IdP) to automatically create new AI Hub user accounts upon initial login.

Single tenant AI Hub uses relying party-initiated SSO authentication. Supported IdPs include:

  • Auth0

  • Google Workspace

  • JumpCloud

  • Microsoft Entra ID

  • Okta

  • OneLogin

  • PingIdentity

Customer requirements

Enabling SSO for your single tenant AI Hub environment involves working closely with your AI Hub support team. Your support team performs the configuration steps on the AI Hub side, but it’s your responsibility to review this documentation and ensure the following customer requirements are met:

IdP configuration requirements

The SSO integration flow begins with registering your single tenant AI Hub environment as a relying party in your IdP. Review the following requirements for your app registration.

The term app registration refers to registering your single tenant AI Hub environment as a relying party in your IdP. The same concept is also commonly called an application.
  • App registration name: No AI Hub-specific requirements for label or name.

  • Authentication type: If prompted to select a client authentication type, select client secret basic, or similar. Client secrets are sent using the HTTP BASIC authentication scheme.

  • Application type: If prompted to select an application type, select web application, or similar. AI Hub isn’t a native app, single-page app, or server app.

  • Redirect URI format: The redirect URI format is https://<YOUR-AI-HUB-BASE-URL>/account/sso/oidc/callback. For example, https://customer.aihub.com/account/sso/oidc/callback.

    The redirect URI is sometimes called the callback URL.

  • Scopes and claims: AI Hub requires the openid, email, and profile scopes.

    • (Optional) The claims family_name and given_name can be used to populate the member’s profile.

    • (Optional) AI Hub supports using a custom claim to gate AI Hub access. When enabled, you can define a custom claim and use its true/false value to permit the associated user to create or log in to their AI Hub account. The custom claim has no naming requirements but must pass a Boolean value, where true permits access.

      To use the custom claim feature, connect with AI Hub Support to ensure your environment has the OIDC_ALLOW_USER_CLAIM_NAME environment variable enabled.

App registration information requirements

To complete the SSO configuration on the AI Hub side, AI Hub support requires the following information about your app registration:

  • Discovery URL: Also called the .well-known endpoint or well known configuration endpoint, this is a lookup location for information about your app registration.

  • Client ID and client secret: These values are used as your app registration’s identifier and password.

This table outlines where you can find the these values in select IdPs.

The accuracy of this table isn’t guaranteed as external product user interfaces aren’t closely monitored.
IdPDiscovery URL valueClient ID and client secret value
Auth0https://{Your Auth0 domain}/.well-known/openid-configurationClient ID and client secret.

Found under Application > Settings.
Google Workspacehttps:<span>//accounts</span>.google.com/.well-known/openid-configurationClient ID and client secret.

Found under Credentials > OAuth 2.0 Client IDs > Your application > Additional information.
JumpCloudhttps:<span>//oauth</span>.id.jumpcloud.com/.well-known/openid-configurationClient ID and client secret.

Make note of your client ID and client secret when creating your app registration.
Microsoft Entra IDOpenID Connect Metadata Document.

Found under App registration > Overview > Endpoints
Application (client) ID and client secret (value).

Found under App registration > Overview (application ID) and App registration > Certificates & Secrets (client secret).
Oktahttps://{Your Okta domain}/oauth2/default/.well-known/openid-configurationClient ID and client secret.

Found under Applications > General > Client Credentials + General Settings.
OneLoginhttps://{Your OneLogin domain}/oidc/2/.well-known/openid-configurationClient ID and client secret.

Found under Applications > OIDC > SSO.
PingIdentityDiscovery URL.

Found under Applications > OIDC > Details.
Client ID and client secrets.

Found under Applications > OIDC > Details.
Was this page helpful?