Thnks is committed to providing a seamless and secure experience for our enterprise clients. To achieve this, we leverage Auth0, a robust and versatile authentication solution, to enable Single Sign-On (SSO) connections to the Thnks platform. This instruction sheet will guide you through the process of configuring connections using OpenID Connect (OIDC), Security Assertion Markup Language 2.0 (SAML2.0), or Azure Active Directory, depending on your organization’s preference and requirements.

OIDC

1

Thnks Information

2

Client Information

In order to establish a SSO connection, the client needs to provide the following:

IdP InformationExample
Client ID0oa4ntasdawevvpA2j697
Client SecretEASf9W2MC-lFreJWVusZAWRQWFeOzvv4BgcOUKw
Issuer URLhttps://acme.okta.com
Home Realm Discovery Domainacme.com
3

Verification

Once Thnks has received the information from Step 2, we will create and test the connection in Auth0.

4

Testing

Once connection has been finalized, Thnks will create or modify a user for the client test team to confirm SSO connection is complete.

SAML 2.0

1

Thnks Information

IdP FieldURL
Post-back URLhttps://thnks.us.auth0.com/login/callback?connection=
Recipient URLhttps://thnks.us.auth0.com/login/callback?connection=
Destination URLhttps://thnks.us.auth0.com/login/callback?connection=
Entity ID/Audience URIurn:auth0:thnks:
Issuer URLExample: https://acme.okta.com
2

Client Information

In order to establish a SSO connection, the client needs to provide the following:

IdP InformationExample
Sign-In URLExample: https://sso.acme.com:9031/idp/SSO.saml2
X.509 Signing CertificateExample: okta.cert
Secure Hash Algorithim PreferenceSHA1 or SHA256 (Default: SHA256)
Mapping SchemaExample: { "user_id": [ "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier", "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn", "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name"], "email": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress", "name": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name" }
3

Verification

Once Thnks has received the information from Step 2, we will create and test the connection in Auth0.

4

Testing

Once connection has been finalized, Thnks will create or modify a user for the client test team to confirm SSO connection is complete.

Azure AD

1

Client Information

IdP FieldURL
Microsoft Azure AD DomainExample: your-azure-ad-domain.com
Client IDExample: 0oa4ntasdawevvpA2j697
Client SecretExample: EASf9W2MC-lFreJWVusZAWRQWFeOzvv4BgcOUKw
Client Secreturn:auth0:thnks:
Identity API (Why Upgrade to v2)Microft Identity Platform (v2) or Azure Active Directory (v1)
2

Verification

Once Thnks has received the information from Step 2, we will create and test the connection in Auth0.

3

Testing

Once connection has been finalized, Thnks will create or modify a user for the client test team to confirm SSO connection is complete.