Step by step guide to configure your Identity Provider as an OIDC Identity Provider within Visma
Follow the steps below to configure your identity provider (IdP) as an OIDC Identity Provider within Visma. Keep Authentication Settings open in your browser while you access your IdP control panel in a new window or tab. You will need to return to the Single Sign-On page to complete the configuration steps.
Prerequisites
Access to your Identity Provider admininstration panel
All of your users under your account in Visma will need a pre-existing account in your IdP with exactly the same email address
A. Configure Visma Single Sign-On app
1. Sign in into Authentication Settings and go to the Single Sign-On page
2. Enter your mydomain (i.e. example)
3. Click Add OIDC Identity Provider choose Your identity provider
B. Configure the OIDC application in your Identity Provider
Open a new tab/window in your browser and follow these steps:
Log into your identity providers administrative portal.
Go to the page where you setup OpenID Connect integration for applications
Add a new integration/application
When asked for Sign-in and Sign-out redirect URI, paste the URLs from Authentication Settings section 1
Configure claims/scopes. Visma expects the scopes
openid - required
email - required, contains users email address
profile - required, contains users firstname and lastname
Save settings
C. Go back to Authentication Settings to continue the Single Sign-On setup
On section 2 Configure OpenID Connect Client enter the following values copied from your new app registration
For Authority the value should be a URL
For Client ID, paste the value copied from Client ID
For Client Secret, paste the value copied from Client Secret
Now go to section 3 Advanced Configuration where you can decide if you wish to “Just in time provision” users when they sign with your IdP into Visma
Click Save
D. Test the Single Sign-On with your Identity Provider
To make sure SSO is working, go to your Visma MyDomain e.g. https://example.my.connect.visma.com directly, and then click the “Sign in with <mydomain>“ button.
Once you have verified that the SSO is working, you can go to Policies and disable Visma credentials, so that your users are straight away redirected to your identity provider