OpenID Connect
Connect Huma with OpenID connect to enable secure, centralized authentication through your organization’s existing identity provider.
🔐 How to Get Auth Keys for OpenID Connect in Huma HR
Huma HR supports OpenID Connect (OIDC) as a secure login provider. This allows your organization to use trusted identity providers (IdPs) like Azure AD, Okta, Google Workspace, and others for Single Sign-On (SSO).
This guide walks you through how to obtain the required OIDC credentials and configure them in Huma HR.
✅ Prerequisites
Ensure the following before starting:
-
You have admin access to your identity provider.
-
You are an Organization Admin in Huma HR.
-
Your IdP supports OpenID Connect (OIDC 1.0).
🔑 Required Information for Huma HR
To integrate OIDC, Huma HR requires:
-
Client ID – Provided when you register an OIDC application.
-
Client Secret – Generated securely during app registration.
-
Domain – The issuer URL of your identity provider (e.g.,
https://login.microsoftonline.com/{tenant-id}/v2.0
).
🛠️ Step-by-Step Instructions
🔷 Azure Active Directory (Microsoft Entra ID)
-
Register a New App
-
Click "New registration"
-
Name the app (e.g., "Huma HR OIDC")
-
Set Redirect URI to:
https://app.huma.hr/auth/callback
-
Collect Required Fields
-
Client ID → found on the app overview page.
-
Client Secret → go to Certificates & secrets, then click New client secret.
-
Domain → usually:
https://login.microsoftonline.com/{tenant-id}/v2.0
-
-
Save the values securely – you’ll need to input them into Huma HR.
🔷 Google Workspace
-
Set Up a Project
-
Go to Google Cloud Console
-
Create a new project
-
-
Configure OAuth Consent Screen
-
Go to APIs & Services > OAuth consent screen
-
Choose "Internal" (or "External" if appropriate)
-
Add application name, support email, and scopes (e.g.,
openid
,email
,profile
)
-
-
Create OAuth 2.0 Credentials
-
Go to APIs & Services > Credentials
-
Click Create credentials > OAuth 2.0 Client ID
-
Choose "Web application"
-
Set Authorized redirect URI:
https://app.huma.hr/auth/callback
-
-
Get Required Fields
-
Client ID and Client Secret are shown after creation
-
Domain:
https://accounts.google.com
-
🔗 Connecting OIDC to Huma HR
Once you have the required fields:
-
Log in to Huma HR as an Organization Admin
-
Navigate to Settings > Authentication
-
Click “Add Login Provider”
-
Choose OpenID Connect
-
Enter:
-
Client ID
-
Client Secret
-
Domain
-
-
Click Save
🧪 Testing the Integration
After setup:
-
Your login screen will show a “Sign in with [Provider]” button
-
Use a test user to verify access
-
Check logs in your IdP for successful token issuance
❓ Troubleshooting
Issue | Solution |
---|---|
Invalid credentials | Double-check the Client ID/Secret values |
Login redirect fails | Confirm the Redirect URI is correctly set in your IdP |
Domain mismatch | Ensure the Domain value matches your IdP’s issuer URL exactly |
Still stuck? Reach out to support@huma.hr for help.