Verint | Telligent Community
Verint | Telligent Community
  • Site
  • User
  • Site
  • Search
  • User
Verint Community 12.x
  • Verint Community
Verint Community 12.x
User Documentation Can I Use an Alternate Identity Provider for Authentication (Single Sign-On)?
  • User Documentation
  • Ask the Community
  • API Documentation
  • Manager Training
  • Developer Training
  • Tags
  • More
  • Cancel
  • New
  • Getting Started
  • Installation
  • -Administration
    • Authentication
  • Moderation
  • Article Collections
  • Blogs
  • Calendars
  • +Customization and Integration
  • Forums
  • Gamification
  • +General Features
  • Groups
  • Ideation
  • Knowledge Collections
  • Media Galleries
  • +Reporting
  • Search Engine Optimization
  • Security
  • Troubleshooting
  • Wikis
  • Release Notes
  • User Documentation
  • Administration

Article Can I Use an Alternate Identity Provider for Authentication (Single Sign-On)?

When it comes to alternate methods of authenticating users in your community you have three options outside of the built in local authentication process.  

For the purposes of this document we will refer to two actors, the “consumer”, which will always be your community platform, and the “identity provider” or “IDP” which is the third party responsible for collecting and verifying a user’s credentials.

Cookies Based Authentication

This method requires a specific encrypted cookie to be generated by the identity provider to be presented to the consumer.  This cookie provides evidence that the identity provider has successfully authenticated the user as well as provides pertinent information about that user to the consumer in order to identify or create the user on the consumer.

Limitations

  • Potentially requires custom development on the identity provider.   The identity provider must create and transmit a specifically formatted and encrypted cookie, meaning this might be additional code on the identity provider.
  • The consumer and identity provider must exist in the same root domain.   This is the nature of sharing cookies across websites.

Fore more information see Cookies Authentication .

Open ID Connect

Open ID Connect, or OIDC, is an extension of the Oauth 2.0 specification to allow users to be identified and authenticated in a cross domain system.  This means that the identity provider and consumer can exist in different domains.  It is standardized so custom development on the identity provider is generally not needed if the identity provider is OIDC compliant.   It works by redirecting a login request to the identity provider for the user to enter their credentials.  Upon authentication the identity provider redirects the user back to the consumer with a unique, short lived code that the consumer then uses to exchange for a JSON Web Token (JWT).  This token provides evidence of authentication and details about the user to be used by the consumer to identify or create the user.

Limitations

  • Community only supports the confidential authorization code flow with a client secret.  
  • While the majority of OIDC compliant identity providers should work(assuming they support confidential authorization code flows), currently only Okta and Azure AD have been completely tested and certified.

For more information see How Do I Setup and Configure SSO Using OpenID Connect? 

Custom Identity Providers

If you have a different identity provider or want to implement your own, this is possible with custom development.   See Single Sign-On Plugins for the steps to create your own authentication plugin.

Do Community Features Like Sliding Expiration and Normal Expiration Work with Single Sign-On?


If the single sign-on provider is built using the Single Sign-On Version 3 framework in community introduced in 12.1(OIDC and Cookies both do) then yes with a few limitations you must be conscious of.

Once a user has authenticated with an identity provider, the session is then managed internally by the community.  Meaning that the actual logged in state is no longer governed by the logged in state of the provider which will generally manage its own state or session.  When logging out of the community, the community will attempt to terminate the session on the identity provider, however logging out of an identity provider will not terminate the session in your community.  This means that the token or cookie lifetimes should generally match your community timeout settings, or be longer.

  • Article

    How can I enable visitors to authenticate through Facebook?

    You must enable SSL/HTTPS access to your community and have a public terms of service policy to use Facebook authentication for Telligent Community. Enabling potential members to authenticate and create…
  • Article

    How can I enable visitors to authenticate through Google?

    Although this client works on non-secure (that is, non-SSL) communities, it is highly recommended that you use SSL (HTTPS) in a production environment. Non-secure connections should only be used for testing…
  • Article

    How can I enable visitors to authenticate through LinkedIn?

    You must enable SSL/HTTPS access to your community to use LinkedIn authentication for Telligent Community. Enabling potential members to authenticate and create accounts by integrating with LinkedIn…
  • Article

    How can I enable visitors to authenticate through Live Connect?

    Although this client works on non-secure (that is, non-SSL) communities, it is highly recommended that you use SSL (HTTPS) in a production environment. Non-secure connections should only be used for testing…
  • Article

    How can I enable visitors to authenticate through Salesforce?

    You must enable SSL/HTTPS access to your community to use Salesforce authentication for Telligent Community. Enabling potential members to authenticate and create accounts by integrating with Salesforce…
  • Article

    How can I enable visitors to authenticate through Twitter?

    You must enable SSL/HTTPS access to your community to use Twitter authentication for Telligent Community. Enabling potential members to authenticate and create accounts by integrating with Twitter can…
  • Article

    How can I synchronize Active Directory (AD) groups with Telligent Community roles?

    This guide assumes that Active Directory / Windows Authentication and LDAP integration is already properly enabled and configured for your Telligent Community site. Active Directory users can be synchronized…
  • Article

    How Do I Configure Okta for OpenID Connect and SCIM Provisioning

    In order to utilize OpenID Connect or SCIM provisioning(or both) you must first locate the Verint Community Application in the Okta OIN catalog. This functionality is only available in version 12.0.0.17629…
  • Article

    How do I control which Active Directory (AD) fields are synchronized and editable on member profiles?

    This guide assumes that Active Directory / Windows Authentication and LDAP integration is already properly enabled and configured for your Telligent Community site. The LDAP.config file contains all…
  • Article

    How Do I Setup User Provisioning Using SCIM?

    SCIM 2.0 is a mechanism where users can be pushed, or provisioned from a third party SCIM client to a SCIM service provider, in this case your community. In most circumstances this third party SCIM client…
  • Article

    How Do I Setup and Configure SSO Using OpenID Connect?

    Compatibility SSO using OpenID connect was introduced in version 12.0.0.17629 , and is only available in this and later version of the community platform. While this functionality may work with other…
  • Verint
  • Professional Services
  • Submit a Support Ticket
  • Become a Partner
  • Request a Demo
  • Contact Us

About
Privacy Policy
Terms of use
Copyright 2025 Verint, Inc.
Powered by Verint Community