Transcribe App on Edge supports Open ID Connect (OIDC) SSO for Login access to the app.

Configuration is relatively simple and consists of configuring the Identity Provider (e.g, JumpCloud) and entering a few settings in the OIDC SSO form in the Transcribe App.


Configure Identity Provider


We will use JumpCloud as an example. 

First you need to create a new Application:



We need to select Custom OIDC App:



On the General Info we enter the name and you can choose to show it on the JumpCloud User portal:



On the SSO tab we enter the redirect and login URLs for your deployment of the Transcribe App.

The redirect URI will have the form: https://{your edge transcribe app hist}:{port}/auth-svc/openid-relay/callback The login URI will have the form: https://{your edge transcribe app hist}:{port}/transcribe-app/login 

 

We also need to specify Attribute mapping for email, given_name, and family_name:



We do not make any changes on the Identity Management tab, 

On the User Groups tab we select user groups that should have access to the Transcribe App, and we click Activate:



After clicking Activate we will get the Client ID and Client Secret values. We will need them to enter into the Transcribe App.

Make sure you save the Secret as it will not be available afterwards.




Configure Transcribe App


Within the transcribe App we need to enter a few settings from the JumpCloud. You can find the OIDC SSO Settings under Profile -> Account settings:



The OIDC settings include:




If you want to allow all your users to automatically have access to the Transcribe App if they can authenticate with PingId, then you need to put your domain into the "Allow signup with emails from the following domains" field in the account Settings. This is optional, without it you can always invite PingId users to the Transcribe App one by one (from the Profile -> Account -> Users).