With the Enterprise plan, you can configure OpenID Connect for single sign-in (SSO). OpenID Connect is a standard authentication protocol that lets users sign in to an identity provider (IdP) such as Google. After they've successfully signed in to their IdP, they are automatically signed in to Mobilize.

Register an OpenID Connect App

Before you can configure SSO to your Mobilize account, you must register it with your service provider. The process varies depending on the service provider.

  1. Register your app on your service provider’s website.
  2. Modify the app settings and set the app domain (or Home Page URL) to Mobilize, for example http://my_community.mobilize.io/users/auth/openidconnect/callback
  3. From the provider’s documentation, get the client ID, client secret and the directory document URL

Set up SSO for your team

In the community settings page you can find the authentication tab, this is where you set up the SSO to the account.

  1. Enter the Directory Document URL (omit ".well-known/openid-configuration"), which contains details about the OpenID Connect provider's configuration. 
  2. Use the client ID from your provider for the Mobilize App ID field.
  3. Use the client secret from your provider for the Mobilize App Secret field.
  4. Enter the Button text that will be visible to your members that tries to login to Mobilize

What to expect after SSO is enabled
From now on, all members will be authenticated by SSO login and Mobilize will use this login to identify user. Member will not have to re-login to Mobilize if they are already log-in to your organization SSO.

Did this answer your question?