Follow this guide to configure an SSO integration between Auth0 OpenID Connect protocol and Reunite.
Important: Before completing the Reunite setup, ensure you preserve the Owner organization role (see "Preserve the Owner organization role" section) to avoid getting locked out of your organization.
- In Reunite, navigate to your organization's Overview page.
- Select SSO and login in the navigation menu on the left side of the page.
- Click Add in the Guest or Corporate Identity Provider section.
- Select OpenID Connect.
- Enter a name for your identity provider.
- Select the default Organization Role for users who log in with the identity provider.
- (Optional) Enter the name of the Default Team.
- Copy the Callback URL. Keep this tab open and continue with the Auth0 configuration in a new tab.
- Log in to Auth0 and select Applications from the menu on the left side of the page.
- Click Create Application.
- Choose Regular Web Applications, and click Create.
- In Auth0's Application Settings tab, scroll to Application URIs and paste the previously copied callback URL into the Allowed Callback URLs field.
- Click the Save Changes button.
- Scroll to Advanced Settings > Endpoints, copy the OpenID Configuration, and paste it in Reunite into the Configuration (.well-known) field.
- In Auth0, scroll to Basic Information, copy the Client ID and Client Secret, and paste them into Reunite.
- In Reunite's RBAC Teams Claim Name field, enter
https://redocly.com/sso/teams
.
Critical step: Complete this step before clicking Save in Reunite to prevent getting locked out of your organization.
To prevent Auth0 from changing users' roles to the default organization role specified in the SSO settings:
- In Auth0, navigate to User Management > Roles.
- Create a role named
redocly.owners
. - Navigate to Users > Roles and assign the
redocly.owners
role to users with an Owner role in your organization. - Return to Reunite and click Save to complete the identity provider setup.
- In Auth0, navigate to Actions > Library, then click Create Action and select Build from Scratch.
- Add a name for your action.
- In the Trigger drop-down, select Login/Post Login.
- Click Create.
- Add the following code to the action and click Deploy:
exports.onExecutePostLogin = async (event, api) => { const namespace = 'https://redocly.com/sso'; if (event.authorization && event.authorization.roles) { api.idToken.setCustomClaim(`${namespace}/teams`, event.authorization.roles); } };
- Navigate to Actions > Triggers, and select post-login.
- Click Add Action, select the Custom tab, and drag and drop your action between Start and Complete.
- Click Apply.
- Single sign-on (SSO) concepts - Understand different identity provider types in Reunite and how they integrate with your project authentication
- Add an identity provider - Step-by-step guide for adding identity providers in Reunite for centralized authentication management
- Configure SSO - Enable multiple identity provider types to give users flexible authentication options for your projects