General OIDC

Configure Single Sign-On (SSO) with any OIDC-compliant identity provider for React Native Stallion.

Free for All Plans:

SSO is available for free on all React Native Stallion plans.

General OIDC Setup

This guide walks you through configuring SSO with any OpenID Connect (OIDC) compliant identity provider.

Prerequisites

  • An OIDC-compliant identity provider
  • Admin access to your identity provider
  • Admin access to your Stallion organization

OIDC Requirements

Your identity provider must support:

  • OpenID Connect Core 1.0
  • Authorization Code Flow
  • Standard OIDC claims (sub, email, name)

Step 1: Create an OIDC Application

In your identity provider, create a new OIDC/OAuth application with the following configuration:

SettingValue
Application NameStallion SSO
Application TypeWeb Application
Grant TypeAuthorization Code
Redirect URI (Login)https://api.stalliontech.io/api/v1/sso/auth/login/callback
Redirect URI (Finalize)https://api.stalliontech.io/api/v1/sso/auth/finalize/callback
Post-Logout Redirect URIhttps://console.stalliontech.io

Step 2: Configure Scopes

Ensure the following scopes are enabled:

  • openid (required)
  • email (required)
  • profile (required)

Step 3: Gather Configuration Values

Collect the following values from your identity provider:

ValueDescription
Client IDThe unique identifier for your application
Client SecretThe secret key for your application
Issuer URLThe OIDC issuer URL (used for discovery)
Authorization URLThe authorization endpoint (if discovery not supported)
Token URLThe token endpoint (if discovery not supported)
UserInfo URLThe userinfo endpoint (if discovery not supported)

OIDC Discovery:

If your identity provider supports OIDC Discovery, you only need the Issuer URL. Stallion will automatically fetch other endpoints from {issuer}/.well-known/openid-configuration.

Step 4: Configure SSO in Stallion Console

  1. Log in to Stallion Console
  2. Navigate to your OrganizationSSO Settings
  3. Click Configure SSO

Step 4.1: Enter Configuration

Enter the following details:

FieldDescription
DomainYour organization's email domain (e.g., yourcompany.com)
Org SlugA unique identifier for your organization
Issuer URLYour identity provider's issuer URL
Client IDFrom Step 3
Client SecretFrom Step 3

Click Next to proceed.

Step 4.2: Verify Domain

  1. Copy the provided TXT record
  2. Add it to your domain's DNS settings
  3. Wait for DNS propagation (this may take a few minutes)
  4. Click Verify to confirm domain ownership

Step 4.3: Finalize SSO

  1. Click Finalize SSO
  2. You will be redirected to your identity provider to log in
  3. Complete authentication with your IdP credentials
  4. Once successful, SSO is fully configured

Claim Mapping

Stallion expects the following claims in the ID token:

Stallion FieldOIDC ClaimRequired
User IDsubYes
EmailemailYes
Namename or preferred_usernameNo
Profile PicturepictureNo

If your identity provider uses different claim names, contact Stallion support for custom claim mapping.

Testing Your Configuration

After saving, click Test Connection to verify:

  1. Redirect to your identity provider works
  2. Authentication completes successfully
  3. User information is retrieved correctly

Troubleshooting

Common Issues

Invalid redirect URI

  • Ensure both redirect URIs are configured in your IdP:
    • https://api.stalliontech.io/api/v1/sso/auth/login/callback
    • https://api.stalliontech.io/api/v1/sso/auth/finalize/callback

Missing claims

  • Verify that email and profile scopes are enabled
  • Check that your IdP is configured to include email in the ID token

Discovery failed

  • If your IdP doesn't support OIDC discovery, manually enter all endpoint URLs

Need Help?:

If you encounter issues during setup, contact our support team at stalliontech.io/contact.