In order to configure an external OIDC provider for an AWS Cognito user-pool, there must be an exchange of information between both the app (Stratusphere) and the customer organization's system administrator.
Stratusphere will provide these to the system administrator:
The system administrator must configure their SSO Provider with a new Application representing Stratusphere (and the above values). They must then provide the following (from the SSO Provider's newly registered application) to Stratusphere:
Note: Each different SSO Identity Provider (Auth0, MS Azure Entra ID, etc) has different configuration screens/steps. This guide is specific for MS Azure Entra ID.
Note: SAML-required fields are different from those required to configure OIDC IdPs. This guide is specific to OIDC configurations.
Steps for the Customer's System Administrator to create an OIDC Client Application in Azure Entra ID representing Stratusphere:
1. In the Azure management portal, go to "Microsoft Entra ID" service
2. In the side menu, choose "App registrations"
3. Click "New registration"
4. Click "Register"
5. Navigate to the new Application registration you created
6. In the "Overview" tab of the registration, note these fields:
7. In the “Branding & properties” tab, note these fields
8. To create a new client secret:
Once the Application registration has been created and the secret has been configured in the Azure portal, please reach out to support at support@stratusphere.app. We will set up a 15min call to finish configuration and test the integration.
Please be prepared to provide the following values (from above) to the Stratusphere support team during the call (none of these values will be stored outside of the secure storage in the production SSO service):
Application (client) ID