Configuring SSO with Seesaw Using OIDC
Creating a federation partner for use with Seesaw isn’t particularly different than for other uses.
Configuration Steps
Configuring SSO in RapidIdentity
As a Tenant Administrator in RapidIdentity:
-
Go to Configuration module > Security > Identity Providers > Federation Partners
-
Click Add Federation Partner and Select OpenID Connect and you will be taken to a page to create the OIDC Partner.
-
Under the General section provide a name for the OIDC Partner and add the following Callback URLs:
https://app.seesaw.me/api/auth/oidc/authorize/code -
Under the Claim Attributes section, add the following Claim Attributes:
Name Claim Claim Type Attribute Value Type LDAP Attribute REGEX Filter Single Valued Binary Email email string ldap mail true false Email Verified email_verified string ldap mail true false Family Name sn string ldap sn true false Given Name given_name string ldap givenName true false Picture picture string ldap idautoPersonPhotoURL true false -
Click Save.
-
It may be necessary to navigate to the the IDP Configuration and trigger a service reload and web reload.
-
Additional setup will be required within Seesaw and you will need to make note of the following values:
a. The Client ID of the created Federation Provider. This can be found on the edit page of the Federation Partner that was created.
b. The Client Secret of the created Federation Provider. This can be found on the edit page of the Federation Partner that was created
c. The discovery URL/Endpoint for OIDC on the RapidIdentity Serverhttps://<rapididentity hostname>/idp/.well-known/openid-configuration
RapidIdentity Endpoints for OIDC are as follows:
| Endpoint | Path |
|---|---|
| Token Endpoint | /idp/profile/oidc/token |
| UserInfo Endpoint | /idp/profile/oidc/userinfo |
| JWKS Endpoint | /idp/profile/oidc/jwks |
| Discovery Endpoint | /idp/.well-known/openid-configuration |
Configuring SSO in Seesaw
As a Seesaw Administrator in Seesaw:
- Go to District Wide Settings
- Select Authentication and Security
- Add your district's email domain(s) as a Trusted Email Domain
- Enter a Configuration Name such as RapidIdentity
- Leave the SSO Type as the default or select OIDC if available
- Enter your https:// followed by RapidIdentity URL followed by /idp as the Issuer URI
- Enter the Client ID and the Client Secret from the RapidIdentity configuration
- Click
Add SSO Configbutton followed byOkto save the SSO configuration
Every Issuer URI in Seesaw must be unique and a RapidIdentity tenant can only be federated with Seesaw at any given time.