ZeroBounce Logo

Docs

Language Icon
  • Sign In
  • Sign Up Free

Languages

ZeroBounce ImageGetting Started
ZeroBounce ImageEmail List Validation
ZeroBounce ImageA.I. Email Scoring
ZeroBounce ImageEmail Finder
ZeroBounce ImageDomain Search
ZeroBounce ImageActivity Data
ZeroBounce ImageMulti-file upload
ZeroBounce ImageIntegrations
ZeroBounce ImageUsage Reports
ZeroBounce ImageYour ZeroBounce Account
ZeroBounce ImageChanging Your Email
ZeroBounce ImageChanging Your Password
ZeroBounce ImageTwo-Factor Authentication
ZeroBounce ImageChanging Your Time Zone
ZeroBounce ImageNotification Settings
ZeroBounce ImageAccount Assist
ZeroBounce ImageInvoices
ZeroBounce ImageDeleting Your Account
ZeroBounce ImageTeam Accounts
ZeroBounce ImageConfigure Okta SSO
ZeroBounce ImageConfigure Azure SSO
ZeroBounce ImageConfigure OpenID SSO
ZeroBounce ImageEmail Validation API
ZeroBounce ImageEmail Finder API
ZeroBounce ImageDomain Search API
ZeroBounce ImageA.I. Scoring API
ZeroBounce ImageActivity Data API
ZeroBounce ImageList Evaluator API
ZeroBounce ImageApi Dashboard
ZeroBounce ImageAPI Wrappers
ZeroBounce ImageAPI Migration
ZeroBounce ImageFAQ
ZeroBounce ImageSecuring Your Account
ZeroBounce ImageAbout ZeroBounce
ZeroBounce ImageDeliverability Tools
ZeroBounce ImageStatus Page
  • Email Validation Homepage
  • Separator
  • Docs
  • Separator
  • Your ZeroBounce Account
  • Separator
  • Configure OpenID SSO
Your ZeroBounce Account

CONFIGURE OPENID SSO

At the OpenID ConnectIdP, create the client application that you want to use for authenticating and authorizing your users.Use the Identity Provider's documentation to create a client application.

Add authorization server as https://zerobounce.okta.com/oauth2/v1/authorize

Add redirect uri as https://zerobounce.okta.com/oauth2/v1/authorize/callback.

Provide client id, client secret and endpoints for IDP Issuer, Authorization, Token and JWKS

ZeroBounce Image
Please note:
All alternative sign in methods, including passwords and social sign ins, will be disabled, leaving avialable only the external SSO option.
Should you have 2FA enabled on your account and also on your OpenID client, authentication will necessitate confirmation from both sources. If you prefer to bypass this requirement, kindly consider disabling either of the two.