Cameyo uses the OpenID Connect (OIDC) standard when users sign in through a third-party cloud Single Sign-On (SSO) identity provider.
To sign into Cameyo using SSO:
- On the Cameyo Admin console, select Admin
> Company Settings.
- Under Authentication, select your SSO from the SSO provider list.
Not all SSO provider options will display if a Subdomain and Identity domain are not set for the account.
Only the Identity domain of the main admin's email domain can be claimed by the customer. Subdomains need to be added separately.
Any other identity domain needs to be requested to be added through Cameyo support.
- At the bottom, click Save.
Cameyo and different SSO providers
This list includes additional information about integrating Cameyo with different third-party SSO providers. Note that Cameyo uses the OpenID Connect (OIDC) standard when users sign in through a third-party cloud SSO identity provider.
There are two ways to connect Cameyo to Microsoft SSO:
- (Basic) Generic—quick and easy
- (Advanced) Custom—allows more options
Integration prerequisites
You need to have the following:
- Identity domain—This looks like
company.cameyo.com - Subdomain—This looks like
company.com
Note: To find your Subdomain and Identity domain, go to Admin > Company Settings > Authentication. If you don't have these ready, you should claim them first or contact Cameyo support to have them set up for you.
(Basic) Generic Microsoft SSO integration
The Generic method displays the Sign in with Microsoft page, which is not specific to your company yet allows connecting to it without much configuration.
To integrate Cameyo with Microsoft SSO:
- On the Cameyo Admin console, go to Admin > Company Settings > Authentication.
- Select Microsoft from the SSO provider list.
- At the bottom, click Save.
(Advanced) Custom Microsoft SSO integration
This mode of SSO connection is more advanced, and allows for a custom SSO dialog and rules for users reaching your Cameyo subdomain. It consists of adding a Microsoft Entra ID app and connecting Cameyo to it.
Create a Microsoft Entra ID App
Unless you already have a Microsoft Entra ID app, you need to create one to connect to Cameyo.
- In your Microsoft Azure portal, go to your Entra ID and click App Registrations.
- Click New registration to create a new app.
- Name the app and select the relevant account type (for example, Accounts in this organizational directory only).
- Under Redirect URI, add
https://online.cameyo.com/oidc.Always use online.cameyo.com and never use your company subdomain. - Click Register.
Important: Take a note of your Application (client ID) and Directory (tenant ID) to use later. This won’t display again.
- Click Certificates & Secrets > New client secret.
Important: Take a note of the new Client Secret to use later. This won’t display again.
Connect to Cameyo
Ensure you have your Directory (tenant) ID, Application (client) ID, and Client Secret ready for use.
- On the Cameyo Admin console, go to Admin > Company Settings > Authentication.
- Select Custom from the SSO provider list.
- For Issuer URL, enter your Directory (tenant) ID:
https://login.microsoftonline.com/[directory (tenant) id]/v2.0For example, if your Directory (tenant) ID is 12345678-90ab-cdef-1234-567890abcdef, you should enter:
https://login.microsoftonline.com/12345678-90ab-cdef-1234-567890abcdef/v2.0 - For Client ID, enter your Azure Application (client) ID.
- For Client Secret, enter your app Client Secret.
- At the bottom, click Save.
You can check the result by navigating to your company subdomain (company.cameyo.com).
Configure group claims for Microsoft Entra SSO
To use Microsoft Entra ID groups in Cameyo, you have to configure group claims in your Microsoft Entra ID SSO app.
Note: Microsoft Entra ID only supports sAMAccountNames when connected to an on-premise active directory (AD) using Entry Connect. If using solely an Entra ID directory, only the group IDs are delivered.
- Sign in to your Microsoft Azure portal.
- Open your Entry ID.
- Go to App registrations.
- Click your [Cameyo SSO] app. The name of the app depends on what you called it when you created it, see Create a Microsoft Entra ID App.
- Go to Token configuration.
- Under Optional claims, click +Add groups claim.
- On the right panel, check boxes for all group types to include in Access, ID, and SAML tokens.
- Customize properties tokens by type. Select sAMAccountName for Access, ID, and SAML.
- Click Add.
To synchronize groups with Cameyo, enter groups in SSO claim for groups on the company page.
- Sign in to your Cameyo Admin console.
- Go to Admin > Company Settings.
- Under Authentication, set the SSO claim for groups to groups.
- Click Save.
Note: Only groups of users that sign in to Cameyo are synchronized. You need to wait a few minutes until the groups are visible.
Configure user or group restrictions for Microsoft SSO
To allow Cameyo access for certain users or groups only, you configure restricted access on your Microsoft Azure portal.
- Sign in to your Microsoft Azure portal.
- Open your Microsoft Entra ID.
- Go to Enterprise applications.
- Click your [Cameyo SSO] app. The name of the app depends on what you called it when you created it, see Create a Microsoft Entra ID App.
- Go to Properties.
- Set User assignment required? to Yes.
- Go to Users and groups.
- Click +Add user/group and select the users and groups you want from the list.
- Click Assign.
Notes:
- Only users and groups assigned to the Cameyo SSO app can sign in to Cameyo. Users who haven’t been assigned to the Cameyo SSO app will receive an error message informing them that the role hasn’t been assigned to them.
- Changes to users and groups on your Microsoft Azure portal can take up to 15 minutes to update.
Prerequisites
- A cloud SSO provider supporting OpenID Connect.
- A subdomain and identity domain configured for your Cameyo account.
Integration steps
- Go to your identity provider's console and add an Application.
- If asked for an application type, Web App is usually the right choice.
- When asked for a redirect URL, enter:
https://online.cameyo.com/oidc.Always use online.cameyo.com and never use your company subdomain. - Select the permissions needed by Cameyo,
openidandemail. - Your application should now be created. Make sure it is enabled.
- Configure your application and copy the connection data
- In your application's configuration section, if Response Type is configurable, make sure it is set to Code.
- If Grant type is configurable, make sure it is set to Authorization Code.
- If the token endpoint authentication method is configurable, make sure it is either set to Client Secret Post or None.
- To connect Cameyo to your provider, make note of these 3 items:
- Issuer URL
- Client ID
- Client Secret
- Once you have these items, enter the values in the Company Settings page, under the Authentication field.
SSO is now enabled on your Cameyo subdomain (company.cameyo.com).
Configure group claims for PingID
To configure PingID group claims for Cameyo, add groups to the app attribute mappings.
- Sign in to your PingIdentity Console.
- Go to Connections > Applications.
- Click your Cameyo SSO app.
- Go to Attribute Mappings.
- Click Edit.
- For Application attribute, enter groups.
- For Outgoing Value, select Group Names.
- Click Save.
Prerequisites
- An account at Okta.
- A subdomain and identity domain configured for your Cameyo account as shown below.
Integration steps
- Go to your Okta Admin console.
-
Go to Applications > Applications.
- Click Create App Integration.
- For Sign-in method, select OIDC - OpenID Connect.
- For Application type, select Web Application.
- Click Next.
- Configure the New Web App Integration.
- Under General Settings, follow these steps:
- For App integration name, enter Cameyo.
- For Grant type, check only the Authorization Code box.
- For Sign-in redirect URIs, enter https://online.cameyo.com/oidc.
Always use online.cameyo.com and never use your company subdomain.
- Under Assignments, provide access either to everyone or only certain groups by configuring:
- Controlled access
- Selected group(s).
- Click Save.
- Under General Settings, follow these steps:
-
Copy the Issuer URL, Client id, and Client secret from your newly created app and enter it on your company page on the Cameyo Admin console.
Configure group claims for Okta SSO
To configure Okta SSO group claims for Cameyo, add groups to the Okta Sign On settings.
Note: To get user group info from Okta during the authentication flow, you must add the!SSO_MEMBEROF_SCOPE=1 PowerTag to your company in the Cameyo Admin console. This instructs Cameyo to request the necessary group data from Okta during login.
- Sign in to your Okta Administrator Console.
- Go to Applications > Applications.
- Click your Cameyo SSO app.
- Go to Sign On > OpenID Connect ID Token.
- On the right, click Edit.
- For Groups claim filter, enter groups.
- For Matches regex, enter .*
- Click Save.
Prerequisites
- A cloud Single-Sign-On (SSO) provider supporting OpenID Connect.
- A subdomain and identity domain configured for your Cameyo account.
Integration steps
-
Go to your identity provider's Portal > Administration > Applications.
-
Click Add App.
-
Search for
openidand choose OpenId Connect (OIDC). -
Enter Display name.
-
Click Save.
-
Go to Configuration.
- Set Redirect URI's to
https://online.cameyo.com/oidc.Always use online.cameyo.com and never use your company subdomain. -
Go to SSO.
-
Set Application Type to Web.
-
Choose Token Endpoint POST.
-
Copy Issuer URL (A).
-
Copy Client ID (B).
-
Copy Client Secret (C).
-
Click Save
-
Go to your company page and set the SSO provider to Custom (and set the Friendly name to OneLogin, then take the copied data from above (A, B, C) and enter it.
Configure group claims for OneLogin SSO
To configure OneLogin SSO group claims for Cameyo, add the groups parameter and map it to the MemberOf user group claim in OneLogin.
Note: To get user group info from OneLogin during the authentication flow, you must add the!SSO_MEMBEROF_SCOPE=1 PowerTag to your company in the Cameyo Admin console. This instructs Cameyo to request the necessary group data from OneLogin during login.
- Sign in to your OneLogin Administration Portal.
- Go to Applications > Applications.
- Click your Cameyo SSO app.
- Go to Parameters.
- Go to OpenId Connect (OIDC) Field and, to the right, click + to add a new field.
- For New Field > Field name enter groups.
- Check the Multi-value parameter box.
- Click Save.
- For Edit Field Groups, go to Default if no value selected and choose these options:
- MemberOf
- Semicolon Delimited input (Multi-value output).
- Click Save.
Prerequisites
- Google Cloud including Google Workspace.
- A subdomain and identity domain configured for your Cameyo account as shown below.
Integration steps
-
Go to your Google Cloud Console.
-
Open OAuth consent screen.
-
Choose User Type Internal.
-
Enter the App information and if wanted additional scope restrictions
-
Save the consent screen.
-
Click Create Credentials and select OAuth client ID.
- Select Application type Web Application and add
https://online.cameyo.com/oidcto Authorized redirect URIs.Always use online.cameyo.com and never use your company subdomain. -
Click Create and you will get the Client id and Client secret that you need. You can download the JSON file for future reference.
-
Select Custom (not Google in this case) as SSO provider and set the Issuer URL to
https://accounts.google.comand enter the Client id and Client secret from above.
Google and related marks and logos are trademarks of Google LLC. All other company and product names are trademarks of the companies with which they are associated.