Document360 (OIDC)

In this guide, we will cover how to set up Descope as a federated Identity Provider (IdP) using OpenID Connect (OIDC) to implement authentication for Document360.

Create Document360 Federated App

You will first have to configure Document360 as a Federated App in Descope:

  1. Navigate to Federated Apps in the Descope Console
  2. Click on + Application in the top right
  3. Choose "Generic OIDC Application"
  4. Type in your Application name (e.g., "Document360")
  5. Optionally provide an Application ID and Description
  6. Click on the "Create" button

Note

When users sign in to Document360, they will be redirected to Descope's hosted authentication flow. To modify the authentication flow, change the Flow Hosting URL in your Federated App Configuration.

Document360 Configuration

Now, configure the SSO settings in Document360:

  1. Open Document360 in a separate tab or panel.
  2. Navigate to Settings > Users & security > SAML/OpenID in Document360 (this menu covers both SAML and OpenID Connect protocols).
  3. Click the Create SSO button.
  4. Select Others as your Identity Provider (IdP) on the Choose your Identity Provider (IdP) page.
  5. Choose OpenID as the protocol in the Configure the Service Provider (SP) page.
  6. Enter the corresponding values from your Descope Federated Application:
Document360Descope
Client IDProject ID (found in Project Settings)
Client SecretAccess Key (created in Access Keys)
AuthorityAuthorization URL (found in your Descope Federated App Configuration)
  1. On the More Settings page, configure the following:
  • SSO name: Enter a name for the SSO configuration.
  • Customize login button: Enter the text for the login button displayed to users.
  • Auto assign reader group: Toggle on/off as needed.
  • Sign out idle SSO team account: Toggle on/off based on your requirements.
  • Convert existing team and reader accounts to SSO: Choose users to send invite to.

Click Create to complete the OIDC configuration.

Was this helpful?

On this page