OneLogin SSO

Follow the sections in this guide to set up OneLogin SSO.

  • Login to OneLogin as an administrator and click on Applications
  • Click on the Add App button and search for openid connect
  • Select the OpenId Connect (OIDC) app
  • Change the Display Name of the app to Open Metadata and click Save
  • Configure the login Url (http(s)://<domain>/signin) and redirect URI (http(s)://<domain>/callback) as shown below
  • Configure the users in the organization that can access OpenMetadata app by clicking on the Users
  • Click on "SSO" and select None (PKCE) for Token Endpoint.
  • Go to "SSO" and copy the Client ID
  • Copy the Issuer URL
  • Navigate to "SSO" settings of the application and click on Show client secret to copy the secret key

After the applying these steps, you can update the configuration of your deployment:

After everything has been set up, you will need to configure your workflows if you are running them via the metadata CLI or with any custom scheduler.

Note that OneLogin SSO is a layer on top of Custom OIDC.

When setting up the YAML config for the connector, update the workflowConfig as follows:

    hostPort: 'http://localhost:8585/api'
    authProvider: custom-oidc
      clientId: '{your_client_id}'
      secretKey: '{your_client_secret}'
      domain: '{your_domain}'

Still have questions?

You can take a look at our Q&A or reach out to us in Slack

Was this page helpful?

editSuggest edits