Before you begin
To complete this guide, you’ll need:- A C1 enrollment code (if you don’t have an enrollment code, contact support@c1.ai)
- Ability to create an SSO app in the IdP (if using Okta, OneLogin, or JumpCloud)
Step 1: Register your C1 domain
In the Domain field, enter the domain you want to use for your C1 instance.For example, if you work at Acme Co., enter
acmeco to create an acmeco.conductor.one domain.In the Invite code field, paste in the invite code you received from C1. The code is case-sensitive.
Step 2: Authenticate with your SSO provider
Jump to the instructions for your SSO provider:Okta
OneLogin
JumpCloud
Microsoft
PingOne
Open ID Connect (OIDC)
Authenticate with Google
When prompted to login, click your corporate account and continue logging in. Google will now re-authenticate you, if needed, and log you in to C1.Authenticate with Okta
Step 1: Add the C1 app in Okta
First, add the C1 app to Okta.In a new browser tab, navigate to the Okta admin console and click Applications > Applications > Browse App Catalog.
Step 2: Assign users to the Okta app
Next, assign the C1 app to an Okta user or group so the user or group can access and use the app.Click Save and Go Back. The Assigned button for the user or group is disabled to indicate the app integration is assigned.
Step 3: Input OAuth credentials into Okta C1 app
In this step, you’ll configure the SSO settings for the C1 app in Okta. To complete this step you’ll move back and forth between your Okta tab and the C1 registration tab.In Okta, click Applications > Applications > C1 to return to the new C1 application’s details screen.
Copy your Okta domain (such as
acmeco.okta.com) from the browser’s address bar and paste your Okta domain into the Okta domain field in C1.In Okta, click the Sign On tab. Copy the C1 app’s client ID by clicking the Copy to clipboard icon.
In Okta, copy the C1 app’s client secret by clicking the Copy to clipboard icon, then paste the client secret into the Client secret field in C1.
Authenticate with OneLogin
Step 1: Create an OIDC app in OneLogin
In a new browser tab, navigate to the OneLogin administration portal and click Apps.
On the Configuration tab, fill out the specified fields as follows:
- Login Url: Leave this field blank
- Redirect URI’s: Enter
https://accounts.conductor.one/auth/callback - Post Logout Redirect URIs: Leave this field blank
Step 2: Configure the SSO settings on the OneLogin C1 app
In this step, you’ll configure the SSO settings for the C1 app in OneLogin. To complete this step you’ll move back and forth between your OneLogin tab and the C1 registration tab.In OneLogin, copy your OneLogin domain (such as
acmeco.onelogin.com) from the browser’s address bar.Step 3: Assign users to the OneLogin C1 app
Lastly, give your colleagues access to C1 via OneLogin SSO by adding the new C1 app to one or more OneLogin user groups.Select the existing user group you’d like to give access to C1 (or create a new user group by clicking the Create button).
Authenticate with JumpCloud
Step 1: Create an OIDC app in JumpCloud
In a new browser tab, navigate to the JumpCloud Admin Portal and click User authentication > SSO.
On the SSO tab, fill out the specified fields as follows:
- Redirect URIs: Enter
https://accounts.conductor.one/auth/callback - Client Authentication Type: Client Secret POST
- Login URL:
https://YOUR_DOMAIN.conductor.one/login?sso_operation=initiate_login(use the C1 domain you chose in Step 1)
In the User Attribute Mapping section, enter
email in the Service Provider Attribute Name field and select email in the JumpCloud Attribute Name field, then click Add Attribute.Step 2: Configure OIDC settings on the JumpCloud C1 app
In this step, you’ll configure the SSO settings for the C1 app in OneLogin. To complete this step you’ll move back and forth between your JumpCloud tab and the C1 registration tab.Step 3: Grant users access and login
Lastly, give your colleagues access to C1 via JumpCloud SSO by adding the new C1 app to a JumpCloud user group.Select the existing user group you’d like to give access to C1 (or create a new user group by clicking the Create button).
Authenticate with Microsoft
Review the permissions requested by C1. These permissions are needed to establish the SSO link between Microsoft and C1.
- If you have the correct permission level in Microsoft, check the box to Consent on behalf of your organization. This enables the requested C1 permissions for all users in your organization.
- If you do not have the permissions needed to check the box, before other users attempt to sign into C1 using SSO, direct your Microsoft administrator to manage permissions for the C1 application in by navigating to Enterprise applications > C1 SSO > Permissions and clicking Grant admin consent for ….
Authenticate with PingOne
Step 1: Create an OIDC app in PingOne
In a new browser tab, log into your PingOne Administration console and navigate to Applications > Applications.
On the Configuration tab, click Edit and fill out the specified fields as follows:
- Token Endpoint Authentication Method: Client Secret Post
- Redirect URI’s: Enter
https://accounts.conductor.one/auth/callback - Initiate Login URI: Enter
https://your_domain.conductor.one/login
Step 2: Configure the SSO settings on the OneLogin C1 app
Back in the C1 setup tab, paste the Client ID, Client secret, and Environment ID into the form at the right of the page.
Authenticate with generic OpenID Connect
Step 1: Create an OIDC app in your identity provider
In a new browser tab, log into your identity provider and create a new OIDC application.
- Configure the redirect URI to use
https://accounts.conductor.one/auth/callback. - Ensure the authorization code flow is enabled.
Gather OIDC credentials to pass to C1:
- Issuer URL (the base URL of your OIDC provider)
- Client ID
- Client secret
- Optional: Additional scopes beyond openid, profile, and email
Back in the C1 setup tab, paste the Issuer URL, Client ID, Client secret, and any OIDC scopes into the relevant fields in the form at the right of the page.
