SSO External Provider
FleetHD uses the OpenId Connect flow to enable customers to leverage the platform with Single Sign On (SSO). To enable the SSO functionality you must first configure an app registration with your identity provider. A few OpenId Connect identity providers are below.
Azure Active Directory
Auth0
Okta
If you’re not sure if your identity provider supports OpenId Connect, contact support@fleethd.com for more information.
Enable id_token response type.
Define a claim that includes the users email address.
Once the app registration is created in the identity provider, send your FleetHd representative the Client Id, Authority and the name of the claim that contains email address. The Client Id is usually a GUID and Authority will be a URI. Be sure to add the below URIS to the redirect URI section of the app registration.
https://identity.fleethd.com/signin-oidc-{tenantId}
Azure Active Directory
Below is a snapshot of the configuration.
Okta
Register an application, make sure the implicit grant is selected in the grant types:
Implicit grant will also need to be set in the access policy of your authorization server:
Make sure a claim is configured containing the email in for id tokens:
Related content
Have questions? Email support@bluedotsolutions.com