The customer activation platform.Every interaction becomes a qualified contact. Book a demo

SSO / OIDC configuration

See which sign-in providers OmniLab supports and what to share with your Customer Success Manager to enable each one.

In this article, you'll see which sign-in providers OmniLab currently supports, what information your team must prepare for each one, and how to test the sign-in flow once your Customer Success Manager enables it.

Prerequisites

  • You know which sign-in provider your organisation wants to use.
  • You have an IT contact who can create or update the application in that provider.
  • The target users already exist in OmniLab or will be created before testing.
  • Each test user will be assigned to at least one organisation in OmniLab.

SSO is enabled per OmniLab environment

Customers do not self-configure SSO in the current flow. Your Customer Success Manager coordinates the setup, provides the exact OmniLab callback URL to register in your provider, and enables the provider for your OmniLab environment.

Enable a provider

Choose the provider you want to use

Confirm whether you want Microsoft Entra ID, Salesforce Marketing Cloud, or a custom enterprise SSO provider with its own sign-in button label.

Prepare the provider details with your IT team

Create or update the application in your identity provider, then gather the IDs, secrets, URLs, and any scope details OmniLab needs for that provider.

Share the configuration details with your Customer Success Manager

Send the provider details to your Customer Success Manager so OmniLab can enable the provider for your environment and connect it to the correct OmniLab setup.

Create or verify your OmniLab users

Before testing, make sure each user already exists in OmniLab and is assigned to at least one organisation. Sign-in succeeds only for users whose account already exists in OmniLab.

Test the sign-in flow

Open your OmniLab sign-in page, choose the enabled provider button, complete authentication with the provider, and confirm that OmniLab opens with the expected organisation access.

Choose a provider Prepare provider details Share details with Customer Success OmniLab enables the provider Create or verify OmniLab users Test sign-in

Supported sign-in providers

Users only see the providers enabled for their OmniLab environment.

ProviderWhat users typically seeCurrent notes
Microsoft Entra IDA Microsoft button, or your configured display nameBest fit when your organisation already uses Microsoft identity
Salesforce Marketing CloudSalesforce Marketing CloudUses provider-specific OAuth endpoints
Custom enterprise SSO providerYour configured display nameUseful when you want a branded enterprise sign-in button

If you need a provider that is not listed here, confirm availability with your Customer Success Manager before planning your rollout.

Information to share for each provider

Microsoft Entra ID

Share these items with your Customer Success Manager:

Required informationWhy OmniLab needs it
Application (client) IDIdentifies your Entra app
Directory (tenant) IDConnects OmniLab to the correct Microsoft tenant
Client secretLets OmniLab complete the secure sign-in flow
Desired button label, if you do not want the default Microsoft labelControls what users see on the sign-in page
Confirmation that the exact OmniLab callback URL has been registered in Entra IDThe Microsoft app must trust OmniLab's callback URL

For Entra ID and other OpenID Connect-style setups, expect the standard scopes openid, email, and profile.

Salesforce Marketing Cloud

Share these items with your Customer Success Manager:

Required informationWhy OmniLab needs it
Client IDIdentifies your Salesforce Marketing Cloud app
Client secretLets OmniLab complete the secure sign-in flow
Authorization URLStarts the sign-in flow
Token URLLets OmniLab exchange the authorization result for tokens
User info URLLets OmniLab read the signed-in user's identity
Confirmation that the exact OmniLab callback URL has been registeredThe connected app must trust OmniLab's callback URL

Custom enterprise SSO provider

Share these items with your Customer Success Manager:

Required informationWhy OmniLab needs it
Display name for the sign-in buttonControls what users see on the OmniLab sign-in page
Client IDIdentifies your provider app
Client secretLets OmniLab complete the secure sign-in flow
Authorization URLStarts the sign-in flow
Token URLLets OmniLab exchange the authorization result for tokens
User info URLLets OmniLab read the signed-in user's identity
Scope string, if your provider requires oneLets OmniLab request the correct identity data
Confirmation that the exact OmniLab callback URL has been registeredYour provider must trust OmniLab's callback URL

If your provider follows OpenID Connect conventions, the scope string is usually based on openid, email, and profile.

Temporary fallback during rollout

If you want a safer rollout, ask whether Continue with Email should stay enabled while SSO is being tested. OmniLab currently supports email magic-link sign-in as a separate option.

Before you test sign-in

Check these items before you ask users to test:

CheckWhy it matters
The provider is enabled for the correct OmniLab environmentUsers only see providers enabled for their OmniLab environment
The OmniLab callback URL is registered in the providerThe sign-in flow cannot complete without it
The user already exists in OmniLabOmniLab checks that the user account already exists
The user is assigned to at least one organisationOmniLab needs organisation access to finish sign-in cleanly
The user signs in with the same email address that exists in OmniLabOmniLab matches sign-in access to the existing user account

Was this helpful?

Optional comments help us improve this page for future authors and readers.

On this page