Single Sign-On
OpenGovernance supports a wide range of Identity Providers for user authentication. This guide covers the IDPs we’ve successfully integrated with. Since we use OIDC standards, you can also integrate any OIDC-compliant IDP.
Walkthrough
Step 1: Log in to the Azure Portal with an Administrator account. Navigate to Azure Active Directory > App registrations > New registration.
Name: Enter
"OpenGovernance SSO"
.Supported account types: Choose based on your requirements.
Redirect URI: Select Web and enter your OpenGovernance callback URL (e.g.,
https://demo.opengovernance.io/callback
).Click Register.
Step 2: In the Overview section of your newly registered app, copy the Application (client) ID and Directory (tenant) ID for later use.
Step 3: Go to Certificates & secrets in the left menu.
Click New client secret.
Description: Enter a descriptive name (e.g.,
OpenGovernance SSO Secret
).Expires: Select an appropriate expiration period.
Click Add and copy the Client Secret immediately as it will be hidden later.
Step 4: Navigate to API permissions > Add a permission > Microsoft Graph > Delegated permissions.
Select permissions such as
openid
,profile
, andemail
.Click Add permissions.
Click Grant admin consent for [Your Organization] to approve the permissions.
Step 5: Assign users to the application:
Navigate to Enterprise applications > OpenGovernance SSO.
Go to Users and groups and click Add user/group.
Select the users or groups to assign and click Assign.
Add Client ID, Tenant ID, Client Secret in OpenGovernance -> Administration -> SSO
Last updated