Skip to content

OIDC SSO: explain login-page and disabling local login TW-2642#10766

Open
Karuna-Mendix wants to merge 4 commits intodevelopmentfrom
kv-tw-2642
Open

OIDC SSO: explain login-page and disabling local login TW-2642#10766
Karuna-Mendix wants to merge 4 commits intodevelopmentfrom
kv-tw-2642

Conversation

@Karuna-Mendix
Copy link
Collaborator

@Karuna-Mendix Karuna-Mendix self-assigned this Feb 17, 2026
@Karuna-Mendix Karuna-Mendix changed the title OIDC SSO: explain login-page and disabling local login OIDC SSO: explain login-page and disabling local login TW-2642 Mar 2, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

since we don't recommend the use of Anonymous role, Wouldn't it be more consistent if we could remove this explanation?


The OIDC SSO module works without a specified sign-in page. Therefore, in the navigation section of your app, set **Sign-in page** (in the **Authentication** section) to *none*.

If you are configuring navigation for web/responsive apps and want to allow your end-users to choose from a number of different IdPs (multiple IdPs), or to have the option to sign in back into the app after they have signed out, set a **Role-based home page** for role **Anonymous** to **OIDC.Login_Web_Button**. When configuring navigation for PWA apps, set the **Role-based home page** for the **Anonymous** role to `OIDC.Login_PWA_Online_Button` for online apps and `Login_PWA_Offline_Button` for offline apps. See [Role-Based Home Pages](/refguide/navigation/#role-based) in *Navigation* for more information.
Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hi @JaapF, do you have a comment on this section which is removed? CC @murat-ustabas-mx

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, makes sense to remove this, given the fact that we are removing anonymous page.
I trust Murat has reviewed this PR as well?


{{% alert color="warning" %}}
Enabling anonymous users introduces a broader attack surface. If you choose this option, follow Mendix guidelines for [setting up anonymous user security](/howto/security/set-up-anonymous-user-security/) to mitigate potential risks.
In OIDC SSO version 4.1.0 and above, you do not have to enable anonymous users for multiple IdPs. You can remove the `Anonymous` User Role from the module.
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

maybe add: "Also you may want to check if the Anonymous user role can be removed from your app. Not using an anonymous role if not needed is a best security practice."

2. Select *Anonymous* as the **Anonymous user role**

{{< figure src="/attachments/appstore/platform-supported-content/modules/oidc/anonymous-user.png" class="no-border" >}}
If multiple IdPs are configured in the OIDC module, end users can access the same URL (`<your-app-url>/oauth/v2/login`) to initiate authentication. In this case, they will first be redirected to an IdP selection page, where they can choose the IdP they want to use for authentication.
Copy link

@JaapF JaapF Mar 13, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we need somethjing like:

"If multiple IdPs are configured in the OIDC module, 2 mechanisms for selecting the IdP are supported:

  • (1) depending on deeplink, your application logic may redirect to a IdP-specific endpoint (see XXX / more details needed).
  • (2) endusers makes the selection. In this case, your app logic can use (<your-app-url>/oauth/v2/login) to initiate authentication. End-users will first be redirected to an IdP selection page, where they can choose the IdP they want to use for authentication."

Maybe @murat-ustabas-mx can add some more details.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants