- Choosing the world to link your SSO OpenId connect with
- Authentication mandatory
- SSO settings information
- Example: Connecting to Google OpenId provider
Connecting using OpenId Connect
If your authentication provider is compatible with OpenID connect, you can allow your users to authenticate to WorkAdventure using their credentials from your authentication provider. By connecting to an external OpenID provider, WorkAdventure allows users to use their existing login information from that provider to access the WorkAdventure service, making it easier and more convenient for them to log in. This also provides an additional layer of security, as the authentication is handled by your provider, rather than WorkAdventure itself.
Choosing the world to link your SSO OpenId connect with
To configure your provider, you will have to fill these 5 input fields:
- Application name: name of your SSO settings for WorkAdventure, it does not affect the OpenId connection protocol.
- Application id: ID of your SSO OpenId provider. This information is provided by your provider.
- Application secret: Secret of your SSO OpenId provider. This information is provided by your provider.
-
OpenId SSO Domain: URL of your provider. Your OpenId SSO provider should have well-know configuration setting defined URL:
/.well-known/openid-configuration
. For example for the Google OpenId provider, the well-know configuration URL ishttps://accounts.google.com/.well-known/openid-configuration
. So the OpenId domain ishttps://accounts.google.com
- Scope: Scope available for your OpenId provider (openid, profile, email...). You should at least put the "openid" scope.
Authentication mandatory
If you switch on this parameter, any visitor coming to your world will be redirected to the login page of your authentication provider.
SSO settings information
- Our domain is:
https://workadventu.re
. - The redirect URI of your SSO settings will be
https://workadventu.re/oauth/
<application_id>/callback
- Our privacy policy:
https://workadventu.re/privacy-policy
- Our term of use:
https://workadventu.re/terms-of-use
- Our cookie policy:
http://workadventure.localhost/cookie-policy
- Our Sub-processors:
http://workadventure.localhost/subprocessors
Example: Connecting to Google OpenId provider
Create your API Key
Go to Google Cloud Platform : https://console.cloud.google.com/apis/credentials
Create an ID client Oauth.
In the settings form, the WorkAdventure information are:
- Javascript authorize:
https://workadventu.re
- Redirect url authorize:
https://workadventu.re
After this step, your Id and Secret will be generated.
The key generated is listed on your "Client ID Oauth2.0" dashboard.
Consent Google Oauth
The second and last step is on the Oauth consent screen.
If not already specified, set "User Type" to allow access for all selected individuals. After that you can update or create consent page.
Required fields:
- Home page:
https://workadventu.re
- Privacy policy:
https://workadventu.re/privacy-policy
- Terms of use:
https://workadventu.re/terms-of-use
- Domain:
workadventu.re
There are more details about you.
After that, you need to set the scope of your Google SSO provider, as well as set the level of access to the information we can request from your provider for the connected user.
As of this writing, WorkAdventure uses only the email address and the name of the user (you can force the user to use his/her name of OpenID in the world settings).
If all information has been validated, the next step should be confirmation.
If you have any questions, feel free to contact us.