Skip to main content
Version: Cloud

Configure SSO with OIDC

Deeploy supports SSO with OIDC for Google, Microsoft and Okta.

OpenID Connect with Google

To set up OpenID Connect for Google, follow these steps:

  • Go to APIs and services credentials create credentials oauth client id
  • Set up a consent screen using the following scopes:
    • /auth/userinfo.email
    • /auth/userinfo.profile
  • Add a web platform and use https://api.<HOST>/auth/self-service/methods/oidc/callback/google as the allowed redirect URI

Users are allowed to register based on their Google Account domain and cannot be restricted individually. To restrict users from access within Deeploy, you can use manage users in the admin panel or on workspace level

Check the Google documentation for more detailed information.

Check here to see which values Deeploy expects.

OpenID Connect with Microsoft

To set up OpenID Connect for Microsoft, follow these steps:

  • Create a new App Registration
  • Use the generated application ID as your clientId
  • Within the App Registration, go to manage authentication add a platform
  • Add a web platform and use https://api.<HOST>/auth/self-service/methods/oidc/callback/microsoft as the allowed redirect URI
  • Within the App Registration, go to manage certificates & secrets new client secret
  • Use this generated secret as your clientSecret

To restrict or allow access to users, you could:

  • Go to the generated Enterprise Application
  • Manage users in the users and groups tab

Check the Microsoft documentation for more detailed information.

Check here to see which values Deeploy expects.

OpenID Connect with Okta

Check the Okta documentation for detailed information on how to register Deeploy with Okta for OIDC authentication. Check here to see which values Deeploy expects.