Skip to main content
OneLogin supports both OIDC and SAML. We recommend OIDC for new integrations. Grab your OIDC Redirect URL (or SAML ACS URL and SAML Entity ID) from the Endpoints for your IdP card on the Quippy admin portal before you begin.

1. In OneLogin

2. In Quippy

Quippy fieldValue from OneLogin
Issuer URLe.g. https://<subdomain>.onelogin.com/oidc/2
Client IDSSO tab → Client ID
Client SecretSSO tab → Client Secret

3. Test connection

Click Test connection in the Quippy admin portal. OIDC returns the discovered endpoints; SAML confirms the metadata endpoint responds. Then enable SSO. Keep a backup admin until your first SSO sign-in succeeds.

Common gotchas

OneLogin exposes both /oidc (v1) and /oidc/2 (v2) issuers. Use the v2 issuer — it supports PKCE and the discovery doc Quippy fetches.
OneLogin’s ACS (Consumer) URL Validator is a regex. If it’s set to the wrong pattern, OneLogin rejects the AuthnRequest. A safe default is ^https://api\.quippy-lab\.com/.* (or your custom API host).
OneLogin can send Roles or Groups as SAML attributes / OIDC claims. Configure Parameters (SAML) or Scopes (OIDC) so Quippy receives the group claim you mapped under Group → role mapping.