This guide shows how to configure Single Sign-On (SSO) in UNCIA using OpenID Connect (OIDC) with:
Microsoft Entra ID (Azure AD)
Okta
SSO enables your users to log into UNCIA using your corporate identity provider through secure OIDC.
Before you begin:
✔ You must be an Organization Owner in UNCIA
✔ You need Admin rights in Microsoft Entra ID or Okta
✔ You must know your public callback URL:
https://<your_customer_url>/api/v1/identity/o/callback/
⚠ The callback URL must be registered exactly — including trailing slash — in your IdP.
In Azure Portal, go to Microsoft Entra ID → App registrations
Click New registration
From the app’s Overview, copy:
Application (client) ID
Directory (tenant) ID
Go to Certificates & secrets → Client secrets → New client secret
Copy the Value (not the key ID)
Go to Token configuration
Add:
name
preferred_username
This ensures UNCIA receives the expected identity fields.
Go to API permissions
Ensure:
Microsoft Graph
openid
profile
Grant Admin consent.