Skip to main content

I’m configuring SSO via OIDC using Salesforce as the Identity Provider (as documented below).  I’ve run into a problem where the redirection to SF works, and upon redirecting back after successful authentication the Docebo UI says “Something Went Wrong.”     I’ve just had support come back to me and say that they can’t help me troubleshoot this super informative message and that I should work with my AM to engage PS.

Our group is quite technical, and this seems like an unusually unhelpful response since the logging on what went wrong isn’t exposed in the UI.   Looking for a sanity check on anyone else who had problems with OIDC setup initially - did you get support or did you have to pay for a PS engagement?

 

 

Hi @rterakedis We configured SSO via the SAML app with salesforce as the Identity Provider, so not quite the same combination as you. To get everything working we needed a lot of help from an IT specialist at our Docebo reseller, but fortunately this was during our implementation and included in the price of the launch pack. To be honest, I don’t think we would have been able to handle it ourselves with standard support from the help desk.


Closing the loop on this:

Support agreed to help us troubleshoot, although before they got back to us we figured out the issue by looking at the Developer Tools in Chrome (Network Tab).  On one of the failing calls, an error message called out (see below) that a requested scope was not allowed.   During configuration, we had checked the box next to a scope in our Docebo OIDC configuration that wasn’t part of the permitted set of scopes configured in Salesforce.   After fixing this, OIDC was working correctly.

 

That said, we found an issue setting up OIDC using Salesforce as the Identity Provider.   When configuring the “connected app” in Salesforce, there is a checkbox in the “Configure ID Token” section where you can “include custom attributes.”   We’ve used custom attributes with other SaaS providers to send additional user information in the claim.   This claim comes across through OIDC as a “custom_attributes” claim, and the value of that claim is a JSON block of Key-value pairs (i.e. the custom data you’ve mapped inside Salesforce).   Using this we could map non-standard things at the SaaS Provider by specifying the claim/key  (i.e. “Company Name”  ==  custom_attribute>company).  Unfortunately, it appears Docebo adheres to the list of supported_claims made available at the Salesforce well-known URL (your-org.my.salesforce.com/.well-known/openid-configuration/ ) and won’t let you leverage these custom attributes.

 

 


Reply