--- layout: article title: Configure Login with SSO (OIDC) categories: [login-with-sso] featured: false popular: false tags: [sso, oidc, openid, idp, identity] order: 04 --- This article will guide you through the steps required to configure Login with SSO for OpenID Connect (OIDC) authentication. {% callout info %} **Configuration will vary provider-to-provider.** Refer to the following Provider Samples as you configure Login with SSO: - [Okta Sample]({% link _articles/login-with-sso/oidc-okta.md %}) {% endcallout %} ## Step 1: Enabling Login with SSO Complete the following steps to enable Login with SSO for OIDC authentication: 1. In the Web Vault, navigate to your Organization and open the **Settings** tab. 2. In the **Identifier** field, enter a unique identifier for your Organization: {% image /sso/org-id.png Enter an Identifier %} Don't forget to **Save** your identifier. Users will be required to enter this **Identifier** upon login. 3. Navigate to the **Business Portal**. {% image /organizations/business-portal-button-overlay.png Business Portal button %} 4. Select the **Single Sign-On** button. 5. Check the **Enabled** checkbox. 6. From the **Type** dropdown menu, select the **OpenID Connect** option. After selecting **OpenID Connect**, this page will display a list of configuration fields you will need to configure. Keep this page on-hand, as you will need the values of **Callback Path** and **Signed Out Callback Path** to complete [Step 2](#step-2-configure-your-idp). ## Step 2: Configure Your IdP Before you can complete your configuration settings, you must configure your IdP to receive requests from and send responses to Bitwarden. {% comment %} PLACEHOLDER TO ADD PROVIDER SCREENSHOTS Configuration can vary provider-to-provider. Refer to the following samples for assistance: - [{% icon fa-download %} Okta OIDC Sample]({{site.baseurl}}/files/bitwarden_export.csv) {% endcomment %} When you've successfully set your IdP, return to the Bitwarden Business Portal to complete your OIDC configuration. ## Step 3: OpenID Connect Configuration Fields in this section should come from the configured values in [Step 2: Configure your IdP](#step-2-configure-your-idp). Required fields will be marked. Failing to provide a value for a required field will cause your configuration to be rejected. {% image /sso/sso-oidc.png OpenID Connect Configuration screen %} #### Callback Path The URL for Bitwarden authentication automatic redirect. This value will be automatically generated. For all Cloud-hosted instances, `https://sso.bitwarden.com/oidc-signin`. For self-hosted instances, domain is based on your configured Server URL. #### Signed Out Callback Path The URL for Bitwarden sign-out automatic redirect. This value will be automatically generated. For all Cloud-hosted instances, `https://sso.bitwarden.com/oidc-signedout`. For self-hosted instances, domain is based on your configured Server URL. #### Authority (*Required*) Your Identity Provider URL or the Authority that Bitwarden will perform authentication against. #### Client ID (*Required*) The Client identifier used for Bitwarden, as configured in your Identity Provider. #### Client Secret (*Required*) *May be required depending on your IdP's configuration, needs, or requirements* A secret used in conjunction with **Client ID** to exchange for an authentication token. #### Metadata Address (*Required if Authority is not a valid URL*) Identity Provider information which Bitwarden will perform authentication against (*e.g.* Okta Metadata URI). #### OIDC Redirect Behavior Method used by the IdP to respond to Bitwarden authentication requests. Options include: - Form POST - Redirect GET #### Get Claims From User Info Endpoint Check this checkbox if you receive `URI Too Long (HTTP 414)` errors, truncated URLs, or failures during SSO. ## OIDC Attributes & Claims An **email address is required for account provisioning**, which can be passed as any of the attributes or claims in the below table. A unique user identifier is also highly recommended. If absent, Email will be used in its place to link the user. Attributes/Claims are listed in order of preference for matching, including Fallbacks where applicable: |Value|Claim/Attribute|Fallback Claim/Attribute| |-----|---------------|------------------------| |Unique ID|Configured Custom User ID Claims
NameID (when not Transient)
urn:oid:0.9.2342.19200300.100.1.1
Sub
UID
UPN
EPPN| |Email|Configured Custom Email Claims
Email
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
urn:oid:0.9.2342.19200300.100.1.3
Mail
EmailAddress|Preferred_Username
Urn:oid:0.9.2342.19200300.100.1.1
UID| |Name|Configured Custom Name Claims
Name
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
urn:oid:2.16.840.1.113730.3.1.241
urn:oid:2.5.4.3
DisplayName
CN|First Name + “ “ + Last Name (see below)| |First Name|urn:oid:2.5.4.42
GivenName
FirstName
FN
FName
Nickname| |Last Name|urn:oid:2.5.4.4
SN
Surname
LastName|