Shine a light on shadow apps

ConductorOne Docs

Sign up for ConductorOne using OneLogin SSO

Configure a OneLogin OpenID Connect (OIDC) app to set up ConductorOne and enable single-sign-on access for your users.

Welcome!

If you’re a OneLogin user looking to set up ConductorOne for your organization, you’ve come to the right place. Follow the instructions on this page to set up ConductorOne so your colleagues can SSO in with their existing OneLogin credentials.

๐Ÿ“‹ Before you begin

A ConductorOne invite code is required for the setup process. If you don’t yet have an invite code, contact support@conductorone.com.

Step 1: Create a ConductorOne instance

  1. Navigate to https://accounts.conductor.one/accounts/signup.

  2. In the Domain field, enter the domain you want to use for your ConductorOne instance. This will form the URL at which your users access ConductorOne.

    • For example, if you work at Acme Co., enter acmeco to create an acmeco.conductor.one domain.
  3. In the Display name field, enter the name of your company.

  4. In the Invite code field, paste in the invite code you received from ConductorOne. Note that the code is case-sensitive.

  5. Click Sign up with OneLogin.

A new page called Setting up OneLogin to work with ConductorOne opens. Leave this page open, and open a new browser tab to create your ConductorOne OIDC application in OneLogin. Once the application is set up, you’ll return to this registration page to finish configuring SSO for your new ConductorOne instance.

Step 2: Create an OIDC application in OneLogin

  1. In a new browser tab, navigate to the OneLogin administration portal and click Apps.

  2. Click Add App.

  3. Search for “OpenID Connect” or “oidc” and click OpenId Connect (OIDC).

  4. Enter the following information in the specified fields:

    • Display name: ConductorOne
    • (Optional) Logo:
      ConductorOne logo
      Right click to copy.
  5. Click Save.

  6. On the Configuration tab, fill out the specified fields as follows:

    • Login Url: Leave this field blank
    • Redirect URI’s: Enter https://accounts.conductor.one/auth/callback
    • Post Logout Redirect URIs: Leave this field blank
  7. On the SSO tab, make the following selections:

    • Application Type: Web
    • Authentication Method: POST

Step 3: Copy OneLogin application auth details to ConductorOne

Now that the OIDC app is created, retrieve the Client ID and Client Secret and add that information to the Setting up OneLogin to work with ConductorOne page. To complete this step you’ll move back and forth between your OneLogin tab and the ConductorOne registration tab.

  1. In OneLogin, copy your OneLogin domain (such as acmeco.onelogin.com) from the browser’s address bar.

  2. In ConductorOne, paste your OneLogin domain into the OneLogin domain field.

  3. In OneLogin, on the SSO tab, copy the ConductorOne app’s Client ID.

  4. In ConductorOne, paste the Client ID into the Client ID field.

  5. In OneLogin, copy the ConductorOne app’s Client Secret.

  6. In ConductorOne, paste the Client Secret into the Client secret field.

  7. In ConductorOne, click Sign up with OneLogin.

OneLogin will now guide you through the SSO sign-in process and redirect you to the ConductorOne dashboard.

Step 4: Grant OneLogin users access to ConductorOne

Finally, give your colleagues access to ConductorOne via OneLogin SSO by adding the new ConductorOne app to a OneLogin role.

  1. In the OneLogin admin portal, navigate to User Groups.

  2. Select the existing user group you’d like to give access to ConductorOne (or create a new user group by clicking the green Create button).

  3. Click Applications and select ConductorOne.

  4. Click Save.

What’s next?

In the next step of the setup process, we’ll integrate the apps that hold key information about your company’s employees, such as your human resources app or your identity provider (IdP). ConductorOne uses the data from these directory apps to build a complete and accurate list of your organizations’ employees and create ConductorOne user accounts for them. When you’re ready, move on to Connect your user directory.