Cameyo uses the OpenID Connect (OIDC) standard when users sign in through a third-party cloud Single Sign-On (SSO) identity provider.
To sign into Cameyo using SSO:
- On the Cameyo Admin console, select Admin
> Company Settings.
- Under Authentication, select your SSO from the SSO provider list.
Not all SSO provider options will display if a Subdomain and Identity domain are not set for the account.
Only the Identity domain of the main admin's email domain can be claimed by the customer. Subdomains need to be added separately.
Any other identity domain needs to be requested to be added through Cameyo support.
- At the bottom, click Save.
Cameyo and different SSO providers
This list includes additional information about integrating Cameyo with different third-party SSO providers. Note that Cameyo uses the OpenID Connect (OIDC) standard when users sign in through a third-party cloud SSO identity provider.
There are two ways to connect Cameyo to Microsoft SSO:
- (Basic) Generic—quick and easy
- (Advanced) Custom—allows more options
Prerequisites
You need to have the following:
- Identity domain—This looks like
company.cameyo.com - Subdomain—This looks like
company.com
Note: To find your Subdomain and Identity domain, go to Admin > Company Settings > Authentication. If you don't have these ready, you should claim them first or contact Cameyo support to have them set up for you.
(Basic) Generic Microsoft SSO integration
The Generic method displays the Sign in with Microsoft page, which is not specific to your company yet allows connecting to it without much configuration.
To integrate Cameyo with Microsoft SSO:
- On the Cameyo Admin console, go to Admin > Company Settings > Authentication.
- Select Microsoft from the SSO provider list.
- At the bottom, click Save.
(Advanced) Custom Microsoft SSO integration
This mode of SSO connection is more advanced, and allows for a custom SSO dialog and rules for users reaching your Cameyo subdomain. It consists of adding a Microsoft Entra ID app and connecting Cameyo to it.
Create a Microsoft Entra ID App
Unless you already have a Microsoft Entra ID app, you need to create one to connect to Cameyo.
- In your Microsoft Azure portal, go to Azure Entra ID and click App Registrations.
- Click New registration to create a new app.
- Name the app and select the relevant account type (for example, Accounts in this organizational directory only).
- Under Redirect URI, add
https://online.cameyo.com/oidc - Click Register.
Important: Take a note of your Application (client ID) and Directory (tenant ID) to use later. This won’t display again.
- Click Certificates & Secrets > New client secret.
Important: Take a note of the new Client Secret to use later. This won’t display again.
Connect to Cameyo
Ensure you have your Directory (tenant) ID, Application (client) ID, and Client Secret ready for use.
- On the Cameyo Admin console, go to Admin > Company Settings > Authentication.
- Select Custom from the SSO provider list.
- For Issuer URL, enter your Directory (tenant) ID:
https://login.microsoftonline.com/[directory (tenant) id]/v2.0For example, if your Directory (tenant) ID is 12345678-90ab-cdef-1234-567890abcdef, you should enter:
https://login.microsoftonline.com/12345678-90ab-cdef-1234-567890abcdef/v2.0 - For Client ID, enter your Azure Application (client) ID.
- For Client Secret, enter your app Client Secret.
- At the bottom, click Save.
You can check the result by navigating to your company subdomain (company.cameyo.com).
Prerequisites
- A cloud SSO provider supporting OpenID Connect.
- A subdomain and identity domain configured for your Cameyo account.
Steps
- Go to your identity provider's console and add an Application
- If asked for an application type, Web App is usually the right choice.
- When asked for a redirect URL, enter:
https://online.cameyo.com/oidc(always useonline.cameyo.com, never your company's subdomain!). - Select the permissions needed by Cameyo,
openidandemail. - Your application should now be created. Make sure it is enabled.
- Configure your application and copy the connection data
- In your application's configuration section, if Response Type is configurable, make sure it is set to Code.
- If Grant type is configurable, make sure it is set to Authorization Code.
- If the token endpoint authentication method is configurable, make sure it is either set to Client Secret Post or None.
- To connect Cameyo to your provider, make note of these 3 items:
- Issuer URL
- Client ID
- Client Secret
- Once you have these items, enter the values in the Company Settings page, under the Authentication field.
SSO is now enabled on your Cameyo subdomain (company.cameyo.com).
Prerequisites
- A cloud SSO provider supporting OpenID Connect.
- A subdomain and identity domain configured for your Cameyo account as shown below.
Steps
-
Go to your identity provider's console and go to Applications.
-
Click Create App Integration.
-
Choose OIDC.
-
Select Web Application and click Next.
-
Configure App integration name.
-
Grant types
-
Authorization code and Implicit (hybrid)
-
-
Set the Sign-in redirect URI to
https://online.cameyo.com/oidc(always useonline.cameyo.com, never your company's subdomain!). -
Choose the assignments you want, either everyone or only certain groups and click Save.
-
Get the needed data (A), (B) and (C) from your newly created application and enter it on your company page.
Prerequisites
- A cloud SSO provider supporting OpenID Connect.
- A subdomain and identity domain configured for your Cameyo account as shown below.
Steps
-
Go to your identity provider's Portal > Administration > Applications.
-
Click Add App.
-
Search for
openidand choose OpenId Connect (OIDC). -
Enter Display name.
-
Click Save.
-
Go to Configuration.
-
Set Redirect URI's to
https://online.cameyo.com/oidc(always useonline.cameyo.com, never your company's subdomain!). -
Go to SSO.
-
Set Application Type to Web.
-
Choose Token Endpoint POST.
-
Copy Issuer URL (A).
-
Copy Client ID (B).
-
Copy Client Secret (C).
-
Click Save
-
Go to your company page and set the SSO provider to Custom (and set the Friendly name to OneLogin, then take the copied data from above (A, B, C) and enter it.
Prerequisites
- Google Cloud including Google Workspace.
- A subdomain and identity domain configured for your Cameyo account as shown below.
Steps
-
Go to your Google Cloud Console.
-
Open OAuth consent screen.
-
Choose User Type Internal.
-
Enter the App information and if wanted additional scope restrictions
-
Save the consent screen.
-
Click Create Credentials and select OAuth client ID.
-
Select Application type Web Application and add
https://online.cameyo.com/oidc(always useonline.cameyo.com, never your company's subdomain!) to Authorized redirect URIs. -
Click Create and you will get the Client id and Client secret that you need. You can download the JSON file for future reference.
-
Select Custom (not Google in this case) as SSO provider and set the Issuer URL to
https://accounts.google.comand enter the Client id and Client secret from above.
Google and related marks and logos are trademarks of Google LLC. All other company and product names are trademarks of the companies with which they are associated.