OIDC¶
This is the standard OIDC configuration by default. If your configuration is non-standard, you can switch pages to configure.
Go to Manage > Member Management > SSO Management > User SSO, select the SAML access type, and start adding an identity provider.
Configure¶
- Identity provider name: The name of the platform providing identity management services (❗️This name will serve as the IdP alias and appear on the single sign-on IdP selection interface. To ensure you can quickly locate the desired IdP for login, please provide an appropriate name).
- Remarks: User-defined descriptive information for recording relevant descriptions of the identity provider.
- Identity provider URL: The complete URL of the identity provider, also the service discovery address. For example: https://guance.example.com.
- Client ID: A unique identifier provided by the authentication service, used to identify the client application.
- Client secret: Used in conjunction with the Client ID to authenticate the client application.
- Authorization request Scope: The scope of the authorization request. By default, it includes
openid,profile, andemail. Additional claims likeaddressandphonecan be added as needed.
Mapping Configuration¶
To implement SSO login, field mapping between the identity provider (IdP) account information and the Guance account information is required. The main fields are as follows:
- Username: Required; the "username" field from the identity provider, e.g.,
referred_username. - Email: Required; the "email" field from the identity provider, e.g.,
email. - Phone number: Optional; the "phone number" field from the identity provider, e.g.,
phone.
Login Control¶
- Access restriction: Verifies whether the domain suffix of the login email matches the configured domain. Only emails that match have permission to access the SSO login link. User accounts for Guance members can be dynamically created upon first login; they do not need to be pre-created in the workspace.
- Role assignment: Assigns a role to the SSO account upon first login. Accounts logging in subsequently are not affected.
- If SAML mapping is enabled in the workspace, role assignment will prioritize the mapping rules.
- Session persistence: Sets the inactivity timeout and maximum duration for the SSO login session.
Important considerations for user-side OIDC configuration
- Authorization mode: Only the
authorization_codeauthorization mode is supported; its response type must becode. id_tokensignature algorithm: Currently, onlyHS256is supported.-
Authentication method for exchanging
codefortoken:- Supported by default:
client_secret_basic - Custom methods supported:
client_secret_post,client_secret_basic,none
- Supported by default:
-
scoperange:-
Default scope:
openid,profile,email,phone -
Custom requirements: Must include
openid. Others can be customized, but the response must includeemail, and may optionally includephone_number.
-
Non-Standard OIDC Configuration¶
How to understand non-standard OIDC configuration?
Non-standard configurations typically occur when the client side uses OAuth2 for authentication. However, the OAuth2 protocol does not specify an interface for obtaining account information, leading to significant variations in how user information is retrieved, which is crucial for successful mapping. Additionally, differing interface design rules on the client side can result in inconsistent parameter casing conventions compared to the protocol, which also constitutes a non-standard scenario.
- Go to Manage > Member Management > SSO Management > OIDC > Create Identity Provider.
- Click the button in the top right corner to switch to the standard OIDC configuration page.
- Identity provider name: The name of the platform providing identity management services.
- Configuration file upload: Click to download the template, fill in the relevant information, and then upload it.
- Remarks: User-defined descriptive information for recording relevant descriptions of the identity provider.
- Login Configuration.
Obtaining URLs¶
After successfully adding the identity provider, you can obtain the Callback URL and Initiate Login URL.
| Field | Description |
|---|---|
| Callback URL | The callback address agreed upon in the OIDC protocol for receiving authentication responses from the identity provider after successful authentication. |
| Initiate Login URL | The entry address provided by the identity provider for initiating the OIDC login flow from the Guance side. |
After obtaining these two URLs, they need to be provided to the identity provider.
Login Verification¶
- Access the Guance SSO page via email login: https://auth.guance.com/login/sso.
- Enter the email address configured during SSO creation and select the IDP associated with the workspace you wish to log into.
- After successful authentication, you will be redirected to the workspace selection interface.
- Log in to that address.
- Enter your username, password, and other required information.
- Login is successful.
Note
- If role mapping is enabled in the workspace but the current user does not match any role or if role mapping is disabled, an "No access permission" message will be displayed.
- After an identity provider is deleted from a workspace, users will not see unauthorized workspaces when selecting SSO login.

