With the Enterprise plan, you can configure OpenID Connect for single sign-on (SSO). OpenID Connect is a standard authentication protocol that lets users sign in to an identity provider (IdP) such as Google. After they've successfully signed in to their IdP, they are automatically signed in to Mobilize.
* Looking to configure OneLogin SSO with Mobilize? Check out this article
Register an OpenID Connect App
Before you can configure SSO to your Mobilize account, you must register it with your service provider. The process varies depending on the service provider.
- Register your app on your service provider’s website.
- Modify the app settings and set the app domain (or Home Page URL) to Mobilize, for example http://my_community.mobilize.io/users/auth/openidconnect/callback
- From the provider’s documentation, get the client ID, client secret and the directory document URL
Set up SSO for your team
In the community settings page you can find the authentication tab, this is where you set up the SSO to the account.
- Enter the Directory Document URL (omit ".well-known/openid-configuration"), which contains details about the OpenID Connect provider's configuration.
- Use the client ID from your provider for the Mobilize App ID field.
- Use the client secret from your provider for the Mobilize App Secret field.
- Enter the Button text that will be visible to your members that tries to login to Mobilize
Want to test your SSO? Enter the full Directory Document into Chrome's address bar, you will get a JSON, check this against Google's. Once your Directory Document looks like Google's, it should work.
If you run into any errors, first check your community's SSL certification and make sure it is valid and up to date.
What to expect after SSO is enabled
From now on, all members can authenticate by SSO login and Mobilize will use this login to identify the user. The member will not have to re-login to Mobilize if they are already logged in to your organization SSO.