Single Sign-On

OpenGovernance supports a wide range of Identity Providers for user authentication. This guide covers the IDPs we’ve successfully integrated with. Since we use OIDC standards, you can also integrate any OIDC-compliant IDP.

Walkthrough

Step 1: Log in to the Azure Portal with an Administrator account. Navigate to Azure Active Directory > App registrations > New registration.

  • Name: Enter "OpenGovernance SSO".

  • Supported account types: Choose based on your requirements.

  • Redirect URI: Select Web and enter your OpenGovernance callback URL (e.g., https://demo.opengovernance.io/callback).

  • Click Register.

Step 2: In the Overview section of your newly registered app, copy the Application (client) ID and Directory (tenant) ID for later use.

Step 3: Go to Certificates & secrets in the left menu.

  • Click New client secret.

  • Description: Enter a descriptive name (e.g., OpenGovernance SSO Secret).

  • Expires: Select an appropriate expiration period.

  • Click Add and copy the Client Secret immediately as it will be hidden later.

Step 4: Navigate to API permissions > Add a permission > Microsoft Graph > Delegated permissions.

  • Select permissions such as openid, profile, and email.

  • Click Add permissions.

  • Click Grant admin consent for [Your Organization] to approve the permissions.

Step 5: Assign users to the application:

  • Navigate to Enterprise applications > OpenGovernance SSO.

  • Go to Users and groups and click Add user/group.

  • Select the users or groups to assign and click Assign.

Add Client ID, Tenant ID, Client Secret in OpenGovernance -> Administration -> SSO

Last updated