Search Results :
×Slack Single Sign-On (SSO) login Solution enables easy and secure login into multiple apps/websites using Slack as OAuth and OpenID Connect provider with single Slack login credentials. Here in this guide we will go through the step-by-step process of configuring SSO login between websites/applications and Slack by considering Slack as an IdP (Identity provider) and miniOrange as SP (Service provider) using Slack as an OAuth provider. Once configured successfully, Slack Single Sign-On will let you and your users to securely login to your website/application using existing Slack Credentials via OAuth Protocol. By the end of this guide, users should be able to login to their apps/website from Slack.
IdP Name | Custom Provider |
IdP Display Name | Choose appropriate Name |
OAuth Authorize Endpoint | https://slack.com/oauth/authorize | OAuth Access Token Endpoint | https://slack.com/api/oauth.access | OAuth Get User Info Endpoint (optional) | https://slack.com/api/users.profile.get |
Client ID | From step 1 |
Client secret | From step 1 |
Scope | users.profile:read |
You have successfully completed your Slack App configurations.
Service Provider Name | Choose appropriate name according to your choice |
SP Entity ID or Issuer | Your Application Entity ID |
ACS URL X.509 Certificate (optional) | Your Application Assertion Consumer Service URL |
NameID Format | Select urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress |
Response Signed | Unchecked |
Assertion Signed | Checked |
Encrypted Assertion | Unchecked |
Group policy | Default |
Login Method | Password |
Client Name | Add appropriate Name |
Redirect URL | Get the Redirect-URL from your OAuth Client |
Descrption | Add if required |
Group Name | Default |
Policy Name | As per your Choice |
Login Method | Password |
Note: Choose the Authorization Endpoint according to the identity source you configure.
https://{mycompany.domainname.com}/moas/idp/openidsso
https://{mycompany.domainname.com}/broker/login/oauth{customerid}
In case you are setting up SSO with Mobile Applications where you can't create an endpoint for Redirect or Callback URL, use below URL.
https://login.xecurify.com/moas/jwt/mobile
Few usecases where customers configure multiple IDPs -
For Cloud IDP - | https://login.xecurify.com/moas/discovery?customerId=<customer_id> |
For On-Premise IDP - | https://yourdomain.com/discovery?customerId=<customer_id> |
You can see the screenshot below of the IDP Selection Page with a list of IDPs .
Note: To view the IDP in drop-down list, go to Identity Providers tab > against your configured IDP > Select >Edit , here Enable the Show IdP to Users option.
In this guide, you have learnt how to successfully configure the Slack Single Sign-On (SSO) by integrating Slack as OAuth IdP Provider with miniorange as SP. This solution will let your users securely authenticate themselves for apps/websites using their existing Slack login credentials.
You can connect with any External IDP via SAML, OAuth, CAS or User Directory via LDAP, Database Connection or APIs.
Contact us on idpsupport@xecurify.com for quick guidance(via email/meeting) on your requirement and our team will help you set up SSO with your IdP in no time.
Need Help? We are right here!
Thanks for your inquiry.
If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com
This privacy statement applies to miniorange websites describing how we handle the personal information. When you visit any website, it may store or retrieve the information on your browser, mostly in the form of the cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not directly identify you, but it can give you a more personalized web experience. Click on the category headings to check how we handle the cookies. For the privacy statement of our solutions you can refer to the privacy policy.
Necessary cookies help make a website fully usable by enabling the basic functions like site navigation, logging in, filling forms, etc. The cookies used for the functionality do not store any personal identifiable information. However, some parts of the website will not work properly without the cookies.
These cookies only collect aggregated information about the traffic of the website including - visitors, sources, page clicks and views, etc. This allows us to know more about our most and least popular pages along with users' interaction on the actionable elements and hence letting us improve the performance of our website as well as our services.