Skip to main content

Auth0

Testiny can be configured to use Auth0 as your identity provider for single sign-on (SSO). Testiny supports configuring both SSO and email login, or restricting logins by requiring SSO logins. This guide explains how to configure the Auth0 integration using the OpenID Connect protocol.

Paid feature

Please contact us at [email protected] for an enterprise plan to access this feature. In the future, single sign-on (SSO) will be available in a corporate billing plan.

Configuring SSO

To configure SSO with Auth0, you first need to create a web app integration in Auth0 and then configure Auth0 as the SSO provider in Testiny.

Configuration in Auth0

If you've already created an OAuth client for Testiny in Auth0, then you can skip this section and continue configuring SSO in Testiny.

  1. Log into your Auth0 account, go to (1) applications and click (2) Create Application as shown in the screenshot below. auth0 configuration - step 1

  2. First, define the application name, i.e. Testiny and then choose Regular Web Application. Click Create to continue. auth0 configuration - step 2

  3. Navigate to tab Settings. Note the client ID (1) and the client secret (2). You will need the ID and the secret for the configuration in Testiny later on. auth0 configuration - step 3

  4. Scroll down to "Application Properties". This step is optional. You can upload the Testiny logo here. You can download the Testiny logo here.
    auth0 configuration - step 4

  5. Scroll down further to "Application URIs". In (1), add the following URL as an allowed callback URL:
    https://app.testiny.io/api/v1/oauth/redirect
    In (2), add the following URL as an allowed logout URL:
    https://app.testiny.io/api/v1/auth/logout
    In (3), add the Testiny app URL as an allowed web origin:
    https://app.testiny.io
    auth0 configuration - step 5

  6. Scroll down to "Cross-Origin Authentication" and add the Testiny App URL to the allowed CORS origins:
    https://app.testiny.io
    auth0 configuration - step 6

  7. Then scroll down to "Advanced Settings" and click the expand button (1). Navigate to tab Grant Types (2). Check Authorization Code and Refresh Token. Finally, click Save. auth0 configuration - step 7

  8. Now you can move to Testiny to configure Auth0 as your SSO provider. Please note that you will need the URL to the OpenID Configuration in the next step. You can copy the URL from Auth0 from the Advanced Settings. Navigate to tab Èndpoints and copy the OpenID Configuration URL as shown in the screenshot below. auth0 OpenID Connect configuration URL

Configuration in Testiny

To configure Auth0 as your SSO provider, you need to have admin rights in Testiny. In Testiny, go to the settings and select Organization (1), as shown in the screenshot below. Click on 'Configure single sign-on' (2). A side panel (3) opens where you need to define the following options:

  1. Provider — Choose 'Auth0' from the list.
  2. OpenID Configuration — Specify the URL to the OpenID Connect metadata. In Auth0, the URL should look like the following example:
    https://((auth0domain))/.well-known/openid-configuration
    You can copy this URL from your Auth0 account as described above in step 7 in the Auth0 configuration section.
  3. SSO Domains — Enter the domains that will be able to use single sign-on.
    3.1 If you have already invited users from these domains to your Testiny organization, an option will show up to change the login type of these users. By default, the users' login type will be set to "SSO allowed".
  4. Client ID — Enter the client ID of the application created in Auth0. You can copy the ID from your Auth0 account as described above in step 3 in the Auth0 configuration section.
  5. Client Secret — Enter the client secret of the application created in Auth0. You can copy the secret from your Auth0 account as described above in step 3 in the Auth0 configuration section.
  6. Click on "Save". Once SSO is successfully configured, you can invite SSO users to your organization or update existing users to use SSO login in the user management settings.

Testiny SSO Configuration Steps

To invite users to your organization, navigate to Settings > User management and click the "Invite" button in the top left corner. A side panel will appear, where you can choose whether the SSO login is allowed, required or disabled:

  • allowed — the user can log in via SSO, but can also create a password in Testiny and use the email login
  • required — the user must log in via SSO
  • disabled — the user cannot log in via SSO, only with email login

Then, enter the email address of the user to be added and optionally the first and last name. In the "Role" drop-down, you can adjust the user’s permissions. Learn more about the user management in Testiny.

Logging into Testiny

When SSO is configured in your Testiny organization and the user is invited as an SSO user, they can simply log in to Testiny on the login page. When SSO is required, the user can only log in with SSO. If SSO is allowed but not required, the user might also log in via email and password.

note

Please note that the owner of the organization in Testiny cannot be restricted to require SSO login so that the owner can always log in with email & password.

Disabling SSO

To disable SSO, go to Settings > Organization and click the delete icon next to the configured provider. A dialog will be shown to see which users are affected and cannot log in via SSO anymore. After confirming, SSO is disabled and you continue using email/password login or set up a new SSO provider.

Changing your SSO provider

If you want to modify your SSO configuration or change to another SSO provider, simply click the "Configure sinlge sign-on" button to open the configuration side panel. You can change the SSO provider and set up a new SSO configuration, or add new SSO domains to your current configuration. If you remove an SSO domain, single sign-on may be deactivated for users in this SSO domain.