Skip to content
  • There are no suggestions because the search field is empty.

OpenID Connect

Connect Huma with OpenID connect to enable secure, centralized authentication through your organization’s existing identity provider.

🔐 How to Get Auth Keys for OpenID Connect in Huma HR

Huma HR supports OpenID Connect (OIDC) as a secure login provider. This allows your organization to use trusted identity providers (IdPs) like Azure AD, Okta, Google Workspace, and others for Single Sign-On (SSO).

This guide walks you through how to obtain the required OIDC credentials and configure them in Huma HR.


✅ Prerequisites

Ensure the following before starting:

  • You have admin access to your identity provider.

  • You are an Organization Admin in Huma HR.

  • Your IdP supports OpenID Connect (OIDC 1.0).


🔑 Required Information for Huma HR

To integrate OIDC, Huma HR requires:

  • Client ID – Provided when you register an OIDC application.

  • Client Secret – Generated securely during app registration.

  • Domain – The issuer URL of your identity provider (e.g., https://login.microsoftonline.com/{tenant-id}/v2.0).


🛠️ Step-by-Step Instructions

🔷 Azure Active Directory (Microsoft Entra ID)

  1. Register a New App

  2. Collect Required Fields

    • Client ID → found on the app overview page.

    • Client Secret → go to Certificates & secrets, then click New client secret.

    • Domain → usually:
      https://login.microsoftonline.com/{tenant-id}/v2.0

  3. Save the values securely – you’ll need to input them into Huma HR.


🔷 Google Workspace

  1. Set Up a Project

  2. Configure OAuth Consent Screen

    • Go to APIs & Services > OAuth consent screen

    • Choose "Internal" (or "External" if appropriate)

    • Add application name, support email, and scopes (e.g., openid, email, profile)

  3. Create OAuth 2.0 Credentials

    • Go to APIs & Services > Credentials

    • Click Create credentials > OAuth 2.0 Client ID

    • Choose "Web application"

    • Set Authorized redirect URI:
      https://app.huma.hr/auth/callback

  4. Get Required Fields

    • Client ID and Client Secret are shown after creation

    • Domain:
      https://accounts.google.com


🔗 Connecting OIDC to Huma HR

Once you have the required fields:

  1. Log in to Huma HR as an Organization Admin

  2. Navigate to Settings > Authentication

  3. Click “Add Login Provider”

  4. Choose OpenID Connect

  5. Enter:

    • Client ID

    • Client Secret

    • Domain

  6. Click Save


🧪 Testing the Integration

After setup:

  • Your login screen will show a “Sign in with [Provider]” button

  • Use a test user to verify access

  • Check logs in your IdP for successful token issuance


❓ Troubleshooting

Issue Solution
Invalid credentials Double-check the Client ID/Secret values
Login redirect fails Confirm the Redirect URI is correctly set in your IdP
Domain mismatch Ensure the Domain value matches your IdP’s issuer URL exactly
 

Still stuck? Reach out to support@huma.hr for help.