Skip to content

Connect IdPs

An external IdP (Identity Provider) lets your users sign in with their Google, GitHub, Apple, or their company’s corporate IdP (SAML / OIDC). For your workspace, adding an IdP is:

Dashboard → IdPs → Add provider → pick

You’ll need client_id and client_secret from the provider. How to get them varies:

  1. Google Cloud Console → APIs & Services → Credentials.
  2. Create Credentials → OAuth client ID → Web application.
  3. Authorized redirect URIs: paste the callback the dashboard shows when you pick Google. Form: https://auth.<your-slug>.prysmid.com/idps/callback.
  4. Save → copy client_id and client_secret.
  5. In the Prysm:ID dashboard, paste both. Test → activate.

Default scopes: openid email profile. If you need more (calendar, drive, etc), pass them as additional params — but remember each new scope requires user consent.

It appears as a button on your instance’s login screen. Your user sees:

[ Login with Google ]
[ Login with GitHub ]
[ Login with Acme SSO ] ← your corporate IdP
─── or ───
email: [ ]
password: [ ]

Order is editable: drag & drop in the IdP list. The first one wins ≥40% of conversion (most prominent).

If your enterprise customer wants “only THEIR IdP” for THEIR tenant, not for your whole workspace:

Dashboard → workspace → tenants → <tenant> → IdPs → Add tenant IdP

These overrides apply only on OIDC flows with tenant_hint=<tenant>. Your other tenants don’t see that IdP.

IdPs → ⋯ → Remove. Existing sessions stay alive until expiry (tokens issued before are valid until exp). New logins through that IdP no longer work.

If it was the only IdP in the workspace, we warn you: you’d leave the workspace with no login method except email/password. The MCP server requires human confirmation for this specific operation.