Cobot supports single sign-on (SSO). This means members and admins can log in using various identity providers instead of having to set up a password for Cobot. This can be set up via identity providers that support either OpenID Connect or OAuth2.
OpenID Connect is supported by some big tech companies, so your members can log in with their existing accounts. In addition, dedicated identity providers let you set up your own user management.
Google
Microsoft Azure Active Directory
Sign in with Apple
Auth0 / Okta
Also support social logins (Google, Facebook, LinkedIn, Twitter, GitHub, etc.)
OAuth2 requires more technical knowledge but is supported by more services and open-source projects.
WordPress OAuth / WP OAuth Server
Slack
Facebook
LinkedIn
To set up SSO, click Setup » Single Sign-on » Add Provider, and follow the guides. After adding a provider, you will be given a single sign-on link to place on your website.
Optionally, links can be added to the login and signup forms on Cobot. Members who visit this link will be able to sign up and log in to this space on Cobot using said provider. The provider must support the OAuth2 or OpenID Connect protocol, which will be used to authenticate members.
Here are the configuration steps for a few popular providers:
Slack
Unfortunately, Slack's OAuth2 implementation deviates from the standard, requiring a bit of extra setup.
To set up Cobot Single Sign-on (SSO) with Slack:
* create an app on Slack with the identity.basic
and identity.email
scopes.
* create a login provider configuration on Cobot under Setup -> Single Sign-on -> Add OAuth 2 Provider
* and fill out the form as below:
Google uses OpenID Connect which makes the setup very easy.
Create an app on Google
Create a login provider configuration on Cobot under Setup -> Single Sign-on -> Add OpenID Connect Provider
and fill out the form as below (add the Client ID/secret from Google):
More information about using Google for OpenID Connect can be found here.
Microsoft Azure Active Directory B2C
Microsoft uses OpenID but not all of it so the setup is not as easy as it should be. When setting up SSO, select OAuth 2 and not OpenID Connect.
Fill out the form as below, replacing <TENANT_ID> with your tenant id from Microsoft.
Authentication URL
https://<TENANT_ID>.b2clogin.com/<TENANT_ID>.onmicrosoft.com/B2C_1A_PortaleStdFtc_SI/oauth2/v2.0/authorize
Access Token Endpoint URL
https://<TENANT_ID>.b2clogin.com/<TENANT_ID>.onmicrosoft.com/B2C_1A_PortaleStdFtc_SI/oauth2/v2.0/token
Access Token Scope
openid
User Endpoint URL
User Email JSON Pointer
Access Token JSON Pointer
/id_token
For more information, click here.