/
SSO External Provider

SSO External Provider

FleetHD uses the OpenId Connect flow to enable customers to leverage the platform with Single Sign On (SSO). To enable the SSO functionality you must first configure an app registration with your identity provider. A few OpenId Connect identity providers are below.

  • Azure Active Directory

  • Auth0

  • Okta

If you’re not sure if your identity provider supports OpenId Connect, contact support@fleethd.com for more information.

Enable id_token response type.
Define a claim that includes the users email address.

Once the app registration is created in the identity provider, send your FleetHd representative the Client Id, Authority and the name of the claim that contains email address. The Client Id is usually a GUID and Authority will be a URI. Be sure to add the below URIS to the redirect URI section of the app registration.

  • https://identity.fleethd.com/signin-oidc-{tenantId}

Azure Active Directory

Below is a snapshot of the configuration.

 

 

Okta


Register an application, make sure the implicit grant is selected in the grant types:

image-20240927-000442.png

Implicit grant will also need to be set in the access policy of your authorization server:

image-20240927-000825.png

Make sure a claim is configured containing the email in for id tokens:

image-20240927-001112.png



Related content

Have questions? Email support@bluedotsolutions.com