OIDC SSO
Available on Business and Enterprise plans.
Supported Identity Providers
- Okta
- Microsoft Azure Active Directory (Entra ID)
- Google Workspace
- Auth0
- Any OIDC-compliant IdP (RFC 8252, RFC 7636)
Setup
Step 1: Gather MergeGuide OIDC Parameters
Before configuring your IdP, collect the MergeGuide callback values:| Parameter | Value |
|---|---|
| Redirect URI | https://portal.mergeguide.ai/auth/oidc/callback |
| Discovery endpoint | https://portal.mergeguide.ai/.well-known/openid-configuration |
| Response type | code |
| Code challenge method | S256 (PKCE) |
| Scopes | openid email profile |
Step 2: Create an OIDC Application in Your IdP
Register MergeGuide as an OIDC application. The application type is Web Application (server-side, not SPA or native).Step 3: Configure OIDC in MergeGuide
- Go to Settings > Security > Single Sign-On
- Click Configure OIDC
- Enter the values from your IdP:
| Field | Description |
|---|---|
| Discovery URL | Your IdP’s .well-known/openid-configuration URL |
| Client ID | The client ID from your IdP app registration |
| Client Secret | The client secret from your IdP app registration |
- Click Save and Test
Step 4: Test the Connection
Click Test SSO — a new window opens the OIDC login flow without affecting your current session. Complete authentication and verify your attributes are parsed correctly. Click Enable SSO when satisfied.IdP-Specific Setup
Okta
Create a new application
In Okta, go to Applications > Applications > Create App Integration. Select OIDC - OpenID Connect and Web Application.
Configure the app
- App name: MergeGuide
- Sign-in redirect URI:
https://portal.mergeguide.ai/auth/oidc/callback - Sign-out redirect URI:
https://portal.mergeguide.ai/auth/signout - Assignments: Assign to the appropriate groups
Copy credentials
From the app’s General tab, copy the Client ID and Client Secret.Discovery URL:
https://<your-okta-domain>/.well-known/openid-configurationAzure Active Directory (Entra ID)
Register an application
In the Azure portal, go to Azure Active Directory > App registrations > New registration.
- Name: MergeGuide
- Redirect URI: Web —
https://portal.mergeguide.ai/auth/oidc/callback
Add a client secret
Go to Certificates & secrets > New client secret. Set an expiration and copy the secret value immediately.
Configure token claims
Go to Token configuration > Add optional claim. Add the
email claim to ID tokens. If email is not in the token, add it under Optional claims > ID > email.Copy the discovery URL
The discovery URL format is:Find your Tenant ID on the Overview page of your Azure AD directory.
Google Workspace
Create OAuth credentials
In Google Cloud Console, go to APIs & Services > Credentials > Create Credentials > OAuth client ID.
- Application type: Web application
- Authorized redirect URIs:
https://portal.mergeguide.ai/auth/oidc/callback
Copy credentials
Copy the Client ID and Client Secret.Discovery URL:
https://accounts.google.com/.well-known/openid-configurationRestrict to your domain (recommended)
Set the Authorized JavaScript origins to your domain and use Google Workspace domain restriction via the OAuth consent screen Authorized domains field to prevent sign-in from personal Google accounts.
Token and Claims Reference
MergeGuide reads the following claims from the OIDC ID token:| Claim | MergeGuide Field | Required |
|---|---|---|
sub | User identifier | Yes |
email | Email address | Yes |
given_name | First name | No |
family_name | Last name | No |
name | Display name (fallback) | No |
email is not present in the ID token, the user cannot be provisioned.
Authorization Code Flow with PKCE
MergeGuide uses PKCE (RFC 7636) for all OIDC flows. The flow:- MergeGuide generates a random
code_verifierand computescode_challenge = BASE64URL(SHA256(code_verifier)) - Authorization request includes
code_challengeandcode_challenge_method=S256 - After authentication, the IdP returns an authorization
code - Token exchange includes the original
code_verifier - IdP verifies the verifier against the challenge before issuing tokens
Enforcement
Once OIDC is enabled, choose an enforcement level under Settings > Security > SSO > Enforcement:| Mode | Behavior |
|---|---|
| Optional | Members can sign in with SSO or email/password |
| Required | All members must use SSO; email/password login is disabled |
Troubleshooting
”Invalid redirect_uri”
The redirect URI in your IdP registration must exactly matchhttps://portal.mergeguide.ai/auth/oidc/callback — no trailing slash, no variations.
”Email claim missing”
Your IdP is not including theemail claim in the ID token. For Azure AD, add the email optional claim to ID tokens. For Okta, verify the profile attributes include email and the app is configured to send email scope.