Skip to content

Single Sign-On

This document provides guidance on SSO (Single Sign-On) sign in functionality based on OIDC (OpenID Connect). Through SSO, users can conveniently and securely sign in to the service by leveraging your organization’s existing ID management system.

OIDC (OpenID Connect) is an authentication layer built on top of the OAuth 2.0 protocol that securely verifies user identity and retrieves basic profile information through a standard protocol. With OIDC, organizations can perform centralized user authentication management using IdPs (Identity Providers) such as Okta, Microsoft Entra ID (formerly Azure AD), and Google Workspace.

Through SSO (Single Sign-On), users can access multiple applications without additional passwords once they sign in with their organization’s IdP account.

  • SP-initiated SSO (Single Sign-On)
  • IdP-initiated SSO (Single Sign-On)

For more information on the listed features, visit the Okta Glossary.

Organization administrators can set up SSO through the following steps.

  • Xint organization admin role
  • An ID provider that complies with the OIDC standard (e.g., Okta, Microsoft Entra ID, Google Workspace)
  • Configuration information provided by the ID provider
    • OIDC issuer URL provided by the ID provider
    • Client ID and Client Secret
Configuration methods by IdP
  1. Access the Okta Admin Console.
  2. In the ApplicationsBrowse App Catalog menu, search for and add Xint. Alternatively, you can add it via the Xint Okta Integration link.
  3. Enter your Organization ID and complete the application setup. You can find your Organization ID on Xint’s SSO settings page.
  4. Assign users and groups that can log in to Xint.
  5. In the Xint AppSign On tab, you can find the Client ID and Client Secret.
  6. The OIDC issuer URL can be found by clicking on the profile information in the upper right corner. (looks like https://acme.okta.com)
  1. Go to Settings → Authentication menu.

    Authentication Menu

  2. Click the Configure button in the OIDC Single Sign-On section.

    Configure Button

  3. Check the Redirect URI and navigate to your ID provider’s settings page to register it as the sign-in redirect URI. If you use Okta, you will also need to register an Organization ID.

    Check Service Provider Details

  4. Enter the Client ID, Client Secret, and OIDC issuer URL provided by your ID provider, then click the Create Connection button.

    OIDC Configuration Form

  5. After completing the configuration, you can view your Organization Sign-In URL. From now on, use this Organization Sign-In URL to sign in to Xint.

    Organization Sign-In URL

Xint currently uses an invitation-based registration system. Even with SSO, members still need to be invited by an organization admin to sign in to the organization.

For information about user invitations, see the Inviting and Managing Organization Members documentation.

Signing In via Organization Login URL (SP-Initiated SSO)

Section titled “Signing In via Organization Login URL (SP-Initiated SSO)”

After SSO is set up, users can sign in using the following method.

  1. Access the Organization Sign-In URL.

  2. Click the “Continue with OIDC SSO” button.

    Click the Continue with OIDC SSO Button

  3. You will be automatically redirected to your organization’s IdP sign in page.

  4. Sign in with your organization account on the ID provider’s page.

  5. Once authentication is complete, you will automatically sign in to the service.

If your identity provider supports IdP-Initiated SSO, you can initiate the signin process from your identity provider.

  1. Start signing in by selecting the Xint app in your identity provider.

  2. Click the “Continue with OIDC SSO” button.

    Click the Continue with OIDC SSO Button

  3. Once authentication is complete, you will automatically sign in to the service.

Q: SSO sign in is failing. What should I do?
A: First, verify that your account has been created. If you have an account, check that your organization’s IdP settings are correct and that SSO setup has been completed.

Q: I successfully authenticated with the IdP, but I’m not able to sign in.
A: Please verify that you created an account through an invitation link first. Without an account, SSO authentication alone will not allow you to sign in.

Q: Can I use multiple IdPs simultaneously?
A: Currently, only one IdP per organization can be configured.

Q: After setting up SSO, can I still use email sign in?
A: The organization administrator can choose whether to allow the existing email sign in method in the settings. If the administrator disables email sign in, you can only sign in through SSO. However, for administrator accounts, you can sign in using any sign-in method regardless of whether it is disabled.