Skip to main content
Skip table of contents

OIDC Configuration

The OIDC Configuration feature allows you to connect your OIDC provider (for example, Auth0, Okta, or Azure AD) to Intelligent Assets (IA). Once configured, users can authenticate with your provider and have their roles and groups automatically assigned in IA.

This guide walks through the available configuration options:

  • General Settings

  • Roles Settings

  • Groups Settings


Configuring an OIDC provider

Note: OIDC providers must be registered in your platform’s Admin OIDC Management Page before they can be configured in IA

First, access the OIDC settings page by navigating to Settings via the user profile dropdown in the top right corner of the app, then select OIDC under the System section of the Settings page.

To configure an OIDC provider, click on the pencil icon next to the provider to open the edit modal. Make changes to the configuration and click Save in the bottom-right corner.

foo.jpg

General Settings

General settings define how users are registered into IA when authenticating through your OIDC provider.

  • Allow auto-registration

    • If enabled: users who log in with your OIDC provider for the first time will automatically be registered in IA.

    • If disabled: users must be manually invited to IA before they can log in with the OIDC provider.

  • Default groups for new users

    • When auto-registration is enabled, you can optionally assign users to one or more default groups.

    • Default groups are applied at registration time.

    • This can be used instead of group mappings (see Groups Settings).

    • If no default groups are selected, new users will not be assigned to any groups unless group mappings are configured.


Roles Settings

Roles settings let you map roles from your OIDC provider into IA roles.

  • Role claim name

    • The name of the custom claim in your OIDC provider that contains role information.

    • The claim must return an array of strings.

    • Example: "https://yourapp.example.com/claims/roles": ["admin", "editor"]

  • Role mappings

    • Define one or more mappings that connect provider roles to IA roles.

    • Example:

      • OIDC role "admin" → IA role Administrator

      • OIDC role "editor" → IA role Editor


Groups Settings

Groups settings let you map groups from your OIDC provider into IA groups.

  • Group claim name

    • The name of the custom claim in your OIDC provider that contains group information.

    • The claim must return an array of strings.

    • Example: "https://yourapp.example.com/claims/groups": ["sales", "engineering"]

  • Group mappings

    • Define one or more mappings that connect provider groups to IA groups.

    • Example:

      • OIDC group "sales" → IA group Field Sales

      • OIDC group "engineering" → IA group Engineering Team


Tip: You can use either default groups, group mappings, or both. Default groups are applied universally, while group mappings allow finer-grained control.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.