All Collections
Integrations, API, & SSO
SSO
Integrating OAuth Authentication with Coassemble
Integrating OAuth Authentication with Coassemble

Use existing OAuth providers like Google Apps to authenticate your Coassemble users.

Lucas avatar
Written by Lucas
Updated over a week ago

Our OAuth is an open standard for delegating access to Internet resources. Coassemble provides an integration which allows organizations to use existing OAuth 2.0 compliant authentication servers to securely share user account information without providing account passwords.

By using our OAuth SSO module, the users in your organization can login to Coassemble with the usernames and passwords that they currently use for your organization, resulting in a painless training experience for employees and administrators alike.

Configuring OAuth

To access the OAuth configuration panel, select the settings menu and choose the Integrations option.

You'll find OAuth on the Advanced integrations tab. Select it to reveal the configuration options.

Before you can start using OAuth, you will need to configure 5 steps labelled as follows:

  1. Appearance

  2. Client information

  3. Authorization

  4. OAuth Scopes and profile mapping

  5. Verification

Step 1: Appearance

The appearance step allows you to configure how the OAuth login button will appear on the Coassemble login page. Coassemble provides a default label and image, however, we recommend you change this so it's clear to your users that they are logging in with your company credentials.

Step 2: Client information

This step is where you add the unique client information provided by your Identity Provider (IDP). Your IDP will provide you with a Client ID and allow you to generate Client Secret that Coassemble uses to securely connect with your IDP.

Once you've added these details, click continue to save changes and move to the next step.

Step 3: Authorization

In this step you'll add the URLs provided by your Identity provide for authentication. In the example below, we're using a Discord application to authorize users

The Authorization URL is the URL of your Identity provided that Coassemble should redirect to when your users try to log in using OAuth.

The Access Token URL is the URL on your IDP that Coassemble calls to retrieve access tokens, once a user has gone through your authorization flow.

Once a user authorizes with your IDP, we need to know which user. The Information URL is what Coassemble calls to retrieve basic information about the authenticated user. E.g. username, email address etc.

Once you've added these details, click continue to save changes and move to the next step.

Step 4: OAuth Scopes and profile mapping

OAuth Scopes

OAuth Scopes allow you to choose how much information you want to pass to Coassemble. At a minimum, you'll need to pass the users email address and unique identifier, however, if you wanted to provide additional information like the users first and last name, you can add that to the scope.

Information mapping

Information mapping helps you correctly map your user information to match Coassembles' format.

Step 5: Verification

This final step ensures that Coasssemble can verify your OAuth logins. When you get to this step, you'll be provided with a redirect URL that you'll need to add to your IDP โ€” look for a field in your OAuth settings titled "Redirect URL".

Once you've added the Redirect URL to your IDP, click the Complete setup button. Doing this switches the integration ON.

To force your users to authenticate with your IDP, switch the 'Force users to authenticate with OAuth' option to ON. This setting will automatically redirect all users to your OAuth flow rather than to the Coassemble login screen.

Did this answer your question?