Skip to content

Identity Provider

Connect an external OIDC-compliant identity provider (Auth0, Okta, Azure AD, or any custom provider) to automatically sync users to your platform. Users from your IdP are mapped 1:1 — no manual user management needed.


When a user authenticates through your external IdP, Vidori automatically:

  1. Creates a corresponding platform user (if new)
  2. Maps the IdP identity 1:1 to the platform user
  3. Keeps entitlements in sync on every login (when Auto Sync is enabled)

This replaces manual user creation and entitlement management via the Entitlements page.


Any OIDC-compliant provider works with Vidori. Common examples:

ProviderIssuer URL format
Auth0https://YOUR_DOMAIN.auth0.com
Oktahttps://YOUR_DOMAIN.okta.com
Azure ADhttps://login.microsoftonline.com/TENANT_ID/v2.0
Custom OIDCYour provider’s issuer URL

  1. Gather your OIDC credentials

    From your identity provider’s admin console, collect:

    • Issuer URL — the base URL of your OIDC provider
    • Client ID — the OAuth2 client identifier
    • Client Secret — the confidential client secret
  2. Register the redirect URI

    In your IdP’s application settings, add the following as an allowed callback/redirect URL:

    https://YOUR_VIDORI_DOMAIN/auth/callback

    The exact redirect URI is shown in the admin panel when configuring the provider.

  3. Configure in Vidori

    In the admin panel, go to Memberships → IdP:

    • Enter a Provider Name (e.g., “Okta Production”)
    • Enter the Issuer URL, Client ID, and Client Secret
    • Adjust Scopes if needed (default: openid profile email)
    • Click Save Configuration
  4. Test the connection

    Click Test Connection to verify your credentials and endpoint are valid.

  5. Enable Auto Sync

    Toggle Auto Sync on to enable automatic user syncing on every login.


FieldDescription
Provider NameA display name for this provider (e.g., “Okta Production”)
Issuer URLThe base URL of your OIDC provider
Client IDThe OAuth2 client identifier from your provider
Client SecretThe confidential client secret
Discovery URLAuto-derived: {Issuer URL}/.well-known/openid-configuration
Redirect URIAuto-derived: {Your domain}/auth/callback — add this to your provider’s allowed callbacks
ScopesSpace-separated OIDC scopes (default: openid profile email)
Auto SyncWhen enabled, user entitlements are synced automatically on each login

When Auto Sync is enabled:

  • Users who log in via the IdP are automatically created on the platform if they don’t exist
  • Existing users have their profile and entitlements updated on each login
  • No manual management is needed via the Entitlements page

When Auto Sync is disabled:

  • The provider configuration is preserved but no automatic syncing occurs
  • Users can still authenticate, but entitlements are not updated
  • Useful for temporarily pausing syncing without removing the configuration

To remove the IdP integration, click Disconnect on the Identity Provider page. This:

  • Removes the provider configuration
  • Does not delete users that were already synced
  • Does not revoke existing entitlements

Users who were synced will remain on the platform and can be managed manually via the Entitlements page.


IssueSolution
Connection test failsVerify the Issuer URL is correct and the discovery endpoint is accessible. Check Client ID and Secret.
Users not syncingEnsure Auto Sync is enabled and the provider shows “Connected” status.
Redirect errorsConfirm the Redirect URI shown in the admin panel is added to your provider’s allowed callback URLs.
Scope errorsSome providers require specific scopes. Check your provider’s documentation for required scopes.