Bring Your Own IdP

Prev Next

If your organization uses an identify provider (IdP) for single sign-on (SSO), you can integrate it with QC Services using OpenID Connect (OIDC).

This article explains how to set up the integration, to allow your users to sign in to QC Services with their existing corporate credentials on your company's login screen.

  1. Register your single page application (SPA) as an OIDC client in your organization's IdP with the following configuration:

    • Proof Key for Code Exchange (PKCE) enabled.
    • Authorization code flow enabled.
    • Sign-in redirect URI: https://qc-services.cqloud.com/login/auth
    • Sign-out redirect URI: https://qc-services.cqloud.com/login
    • Mapped claims: name, email . (The IdP must return these attributes in the ID token.)

  2. Ensure that your users have the necessary permissions to access the SPA.

  3. Share the following with Qwilt (support@qwilt.com):

    • The SPA application client-id.
    • The SPA application issuer URL.
Tip for Okta Users

If you want to initiate the login process directly from the Okta dashboard, set https://qc-services.cqloud.com/login as the 'Initiate Login' URI.