Set up an OpenID Connect (OIDC) provider for federated login

The emnify Portal supports federated login using OpenID Connect (OIDC). Unlike Microsoft Active Directory and Google Cloud Platform, which have out-of-the-box integrations, OIDC is a bring-your-own identity provider (IdP) option. This means you can use any OIDC-compliant IdP - for example, Auth0, Okta, or Keycloak.

This guide uses Auth0 as an example. Configuration details may vary across providers, but the required information is the same.

Prerequisites

Federated login requires that your emnify Portal email matches the email used in Auth0. Verify your email in User Settings.

If you need access with a different email, add another user with the Administrator role under Workspace settings > Users.

Step 1: Create an application

1

Log in to the Auth0 Dashboard.

2

In the sidebar, go to Applications > Applications.

3

Click + Create Application.

4

Enter a Name (for example, emnify) and select Regular Web Application as the application type.

5

Click Create.

Copy the Client ID and Client Secret from Settings > Basic Information. You’ll need them later.

Step 2: Configure application settings

Add redirect and logout URLs

In your application’s Settings tab, find the Application URIs section.

Under Allowed Callback URLs, add the following URL:

$https://prod-e5.okta.com/oauth2/v1/authorize/callback

Under Allowed Logout URLs, add the same URL:

$https://prod-e5.okta.com/oauth2/v1/authorize/callback

Enable the required grant types

In the Settings tab, find the Authorization Requests section, then:

1

Expand Advanced Settings.

2

Open the Grant Types tab.

3

Select the following grant types:

  • Implicit
  • Authorization Code
  • Client Credentials

Finally, click Save at the bottom of the page.

Changes may take up to 30 seconds to take effect.

Keep Advanced Settings open. You’ll copy endpoint values in the next step.

Step 3: Configure SSO in the emnify Portal

2

Go to Workspace settings (building icon) in the top-level navigation and click Single Sign-On (SSO).

3

If you need SSO enabled for your account, contact emnify support. Otherwise, click Add under the OIDC SSO provider.

4

Under General settings, enter the Client ID and Client Secret you copied earlier.

5

Under Endpoints, fill in the Portal fields using values from the Advanced Settings > Endpoints in Auth0:

Portal fieldAuth0 value
IssuerBase OAuth URL (for example, https://your-tenant.auth0.com/)
AuthorizationOAuth Authorization URL
TokenOAuth Token URL
User InfoOAuth User Info URL
JWKSJSON Web Key Set
6

Click Create and Activate.

7

Back on Single Sign-On, confirm that OIDC appears as a listed Provider.

8

Click Verify Integration and complete the login flow.

You must verify the provider before federated login becomes active.

For common setup issues, see the Troubleshooting page.