Connections
Connections define how users can authenticate. Configure social logins, enterprise SSO, and passwordless options.
Connection Types
| Type | Examples | Use Case |
|---|---|---|
| Social | Google, GitHub, Microsoft | Consumer/developer apps |
| Enterprise | SAML, OIDC | Corporate SSO |
| Passwordless | Magic Link, SMS | Frictionless login |
| Database | Email/Password | Traditional login |
Social Connections
- Go to Google Cloud Console (opens in a new tab)
- Create OAuth 2.0 credentials
- Add redirect URI:
https://id.optare.one/oauth/callback/google - In Optare Console, add Google connection with Client ID and Secret
GitHub
- Go to GitHub Developer Settings (opens in a new tab)
- Create a new OAuth App
- Set callback URL:
https://id.optare.one/oauth/callback/github - Add to Optare with Client ID and Secret
Microsoft / Azure AD
- Go to Azure Portal (opens in a new tab)
- Register an application in Azure AD
- Set redirect URI:
https://id.optare.one/oauth/callback/microsoft - Configure in Optare
Enterprise SSO (SAML)
For organizations with existing identity providers.
Configuration
- Go to Settings → Enterprise SSO
- Enable SAML
- Enter IdP details:
| Field | Description |
|---|---|
| Entity ID | Your IdP's entity ID |
| SSO URL | IdP's login URL |
| Certificate | IdP's signing certificate (X.509) |
SP Details (give to IdP)
| Field | Value |
|---|---|
| ACS URL | https://id.optare.one/saml/{org-slug}/acs |
| Entity ID | https://id.optare.one/saml/{org-slug}/metadata |
| Metadata URL | https://id.optare.one/saml/{org-slug}/metadata |
Common IdPs
- Okta: Configure SAML in Connections
- Azure AD: Configure SAML/OIDC in Connections
- OneLogin: Configure SAML in Connections
Passwordless
Magic Link
Email a one-time login link.
Enable:
- Go to Connections → Passwordless
- Enable Magic Link
- Configure email template
User Flow:
1. User enters email
2. Optare sends magic link
3. User clicks link
4. User is logged inSMS OTP
Send a one-time code via SMS (requires Twilio).
Configuration:
- Add Twilio credentials
- Enable SMS Connection
- Configure template
Connection Rules
Domain-Based Routing
Route users to specific connections based on email domain:
| Domain | Connection |
|---|---|
@acme.com | SAML (Okta) |
@partner.com | SAML (Azure) |
* | Social / Password |
Priority
Set connection priority for login page:
- Enterprise SSO (if domain matches)
- Social logins
- Email/Password
Next Steps
- Tenant Settings - Authentication policies
- Connections Setup - Detailed connection setup
- Branding - Customize login page