Skip to main content
Skip table of contents

OIDC IdP integration

This section explains how to integrate an OIDC-based Identity Provider (IdP) with TrustBuilder. Your external application will act as the IdP and TrustBuilder will act as the Service Provider (SP). The steps below will guide you through integrating the IdP to TrustBuilder so that users can authenticate through it.

To integrate an OIDC-based IdP:

  1. Login to the Admin Portal.

  2. Go to Integrations > Identity Providers.

  3. Click on + Set up identity provider.

  4. Select OIDC.

    image-20251009-134851.png
  5. Enter a name and an optional description. You can also import a logo.

  6. Select the subject which is the user attribute that uniquely identifies the user.

    • email: the user's email address will be used to authenticate the principal.

    • user_id: the user’s unique identifier in Trustbuilder will be used to authenticate the principal.

    • username: the user's username will be used to authenticate the principal.

    • predefined: use this option if the subject has manually been defined. This requires manual setup via API calls to specific subject value. See Subject mapping

  7. Enter the issuer URI.
    To find it, open your IdP’s discovery document at https://<your-idp>/.well-known/openid-configuration and look for the value of the issuer field.
    Example: https://<your-idp>/

  8. Provide the Client ID and the Client Secret. They are used to authenticate an application during exchanges with an authorization server.

  9. Choose how TrustBuilder sends its client credentials to the IdP:

    • Client Secret POST → credentials are sent in the body of the POST request (default).

    • Client Secret Basic → credentials are sent in the HTTP Authorization header.

    • PKCE is enabled by default to prevent interception of authorization codes. You can disable it in special cases (confidential back-end applications or legacy IdPs that do not support PKCE) but this is not recommended.

  10. Click on Submit.

The Identity Provider integration is now configured.

In Settings tab, you will find the Redirect URI which should be added in the Identity Provider configuration as an allowed redirect URI.

image-20251010-090557.png

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.