Single Sign-On
Last updated
Last updated
OpenGovernance supports a wide range of Identity Providers for user authentication. This guide covers the IDPs we’ve successfully integrated with. Since we use OIDC standards, you can also integrate any OIDC-compliant IDP.
Step 1: Log in to the with an Administrator account. Navigate to Azure Active Directory > App registrations > New registration.
Name: Enter "OpenGovernance SSO"
.
Supported account types: Choose based on your requirements.
Redirect URI: Select Web and enter your OpenGovernance callback URL (e.g., https://demo.opengovernance.io/callback
).
Click Register.
Step 2: In the Overview section of your newly registered app, copy the Application (client) ID and Directory (tenant) ID for later use.
Step 3: Go to Certificates & secrets in the left menu.
Click New client secret.
Description: Enter a descriptive name (e.g., OpenGovernance SSO Secret
).
Expires: Select an appropriate expiration period.
Click Add and copy the Client Secret immediately as it will be hidden later.
Step 4: Navigate to API permissions > Add a permission > Microsoft Graph > Delegated permissions.
Select permissions such as openid
, profile
, and email
.
Click Add permissions.
Click Grant admin consent for [Your Organization] to approve the permissions.
Step 5: Assign users to the application:
Navigate to Enterprise applications > OpenGovernance SSO.
Go to Users and groups and click Add user/group.
Select the users or groups to assign and click Assign.
Add Client ID, Tenant ID, Client Secret in OpenGovernance -> Administration -> SSO