GitHub | OIDC
1. Display name
Choose a name for your identity provider. This is the user-facing name, so choose a name your users will recognize. This value can be changed later.
2. Redirect Mode
Select how the user will be redirected to the identity provider. You may configure more redirect modes after completing the setup.
3. Prepare IDP
Copy the Callback URL. You will need this when configuring GitHub.
Configure GitHub
external
If you are using SCIM with your provider, make sure to check out the documentation for configuring this before proceeding. It might be that you need to configure this first or at the same time as setting up OIDC.
Access your GitHub Enterprise organization from https://github.com/settings/organizations. Make sure you are logged in as a user with admin privileges to the organization.
In the left sidebar, select Developer settings, oAuth Apps.
Select New oAuth App.
Fill in the details. Paste the callback URL copied from the Prepare IDP step into the Authorization callback URL field.
Complete the registration by clicking Register application.
Copy the Client ID and Client Secret for later use.
Go back to the Kantega SSO setup wizard
4. Scopes
These are the default scopes for your identity provider (IdP). You can add scope values from a list, start typing to add your own or unselect them. A minimum of one scope value is required.
5. Credentials
In this step, you will insert client credentials from GitHub. Copy and paste Client ID and Client secret from the application settings in GitHub.
6. Summary
Confirm that everything looks good and submit your setup
Test
Test that logging in with GitHub works as expected. This will help identify if there are any issues with the configuration. Follow the steps to perform the login test.