Cosmo provides the capability to integrate with various OpenID Connect providers, such as Okta, Auth0, Keycloak, or any other OIDC-compliant provider. Single Sign-On (SSO) is enabled at the organization level. This integration allows you to leverage your chosen OpenID Connect provider for authentication, automatically enrolling users into your organization. When users sign in to your organization, they are seamlessly enrolled and gain access to all the permissions you’ve designated for them. The roles users receive in Cosmo are based on the mappings configured during the setup of the OIDC provider.Documentation Index
Fetch the complete documentation index at: https://wundergraphinc-milinda-eng-8701-implement-cache-warmer-from.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Configuration steps
Please copy the “Login URL” that was generated after connecting the OIDC provider, and share it with your colleagues. The URL is unique for every SSO integration.
If you disconnect the SSO integration, all users who logged in using SSO will be logged out and downgraded to the viewer role. This is a security measure to ensure that synchronization with your authorization server is never compromised. After reconnecting with your Identity Provider (IDP), the login URL will change, and users will receive the appropriate roles upon their next sign-in.