Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
15 changes: 13 additions & 2 deletions umbraco-cloud/set-up/external-login-providers.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,10 +8,22 @@ noIndex: true

# External Login Providers

The External Login Providers feature in Umbraco Cloud allows you to integrate third-party authentication systems to manage backoffice user logins securely and efficiently. This functionality is especially useful for teams that want to simplify login management or use their existing identity systems.

{% hint style="info" %}
This feature is currently only available for backoffice logins.
{% endhint %}

Using OpenID Connect, Umbraco Cloud supports external login providers such as Microsoft Entra ID, Auth0, Google, and so on. This feature helps administrators manage backoffice access, assign user roles, and improve security.

This guide shows you how to set up and configure external login providers for your Cloud projects. It includes the following steps:

* [Prepare your login provider](#prepare-your-login-provider)
* [Register the login provider on Umbraco Cloud](#register-the-login-provider-on-umbraco-cloud)

Additionally, you can explore a few examples in the section below:
* [Configuration scenarios](#configuration-scenarios)

<details>

<summary>Prerequisites (Pre-release)</summary>
Expand Down Expand Up @@ -175,7 +187,7 @@ The **alias** must be unique across different login providers in the same enviro
{% endtab %}
{% endtabs %}

## How to fill in the External Login Provider configuration
## Configuration Fields

Learn about what type of data and information you need for each field in the configuration form.

Expand Down Expand Up @@ -216,4 +228,3 @@ Any user authenticated via the external login provider can have a role claim ass
* Select **Unauthorized** in the **No User Group Found Behaviour** setting.
* Fill in the **User Group Mappings** map.
* Enable **Enforce User Group on login**.

Loading