Skip to content

Generic OIDC 2.0 federation guide

Set up OpenID Connect (OIDC) federation with STACKIT IdP. The STACKIT IdP acts as the Relying Party (RP), and your organization’s system acts as the Identity Provider (IdP).

To configure this federation with your Generic OIDC Provider, complete the following steps.

  1. Create Application: You must create the application on your external identity provider to get the credentials needed to configure the federation. When creating the client, use the following address as the redirect URL:
    https://accounts.stackit.cloud/ui/login/login/externalidp/callback
  2. Token claims: In “Token configuration” configure the token with the following claims:
    • Token type: ID
    • Claims checked:
      • email
      • family_name
      • given_name
      • preferred_username

Open a support ticket with the following information:

General information

  • Federation type: OpenID Connect (OIDC)
  • Reason for integration: Brief explanation (for example, “Enable SSO for enterprise users”)
  • Email domains: All email domains your employees use for login (for example, @example.org and @foobar.com)

OIDC-specific information

Claims mapping

You can specify how claims (attributes) from your OIDC provider map to our user fields:

Confirm the federation works and report the results or any problems you face.

If you have an existing SAML federation and switch to OIDC, the transition is seamless. As long as email addresses remain the same, users won’t lose access or data. User accounts are tied to email addresses, not federation methods.