Enable seamless access to Supahub’s public hub by integrating Single Sign-On (SSO) with your app’s existing authentication credentials.
The Single Sign-On (SSO) feature allows your users to authenticate once and gain access to your feedback hub seamlessly. With SSO integration, you can enable your users to log in to Supahub using their existing credentials from your authentication system. This developer documentation will guide you through the steps to integrate SSO with Supahub.
Before you begin, make sure you have:
Here is a summary of the authentication flow:
redirectTo
parameter appended to the URL: https://yourdomain.com/sso/supahub?redirectTo=https://workspace-name.supahub.com/changelog
redirectTo
parameter passed along: https://workspace-name.supahub.com/api/auth/sso?jwt=payload&redirectTo=https://workspace-name.supahub.com/changelog
Set up a dedicated SSO page
Create a page on your website that will handle the authentication process. For example, you can use the URL: https://yourdomain.com/sso/supahub
. Alternatively, you can use your existing authentication page (login/signup). This page will receive and process authentication requests from Supahub.
Go to your Supahub Dashboard and navigate to the “Settings” section. Look for the SSO settings and enter the URL of the SSO page you created in the “SSO Redirect URL” field.
Once saved the “Login with YourWorkspaceName” button on your public hub’s navbar will be shown automatically.
Authenticate Users
When a user visits your SSO page, use your app’s authentication system to authenticate them. This could involve verifying their credentials or any other authentication mechanism you have in place.
Install JWT packages
Install the required packages for JWT token generation on your server.
Generate the JWT token
Copy and use the “Private Key” from SSO settings to generate a JWT token on your server.
Private Key should be kept secure and not to be shared. Add it in your .env file.
To enhance security measures, Single Sign-On (SSO) tokens are restricted from authenticating users with administrative privileges within any Supahub workspace. Instead, these users will need to log in using the dedicated portal at workspace.supahub.com
Redirect the user back to Supahub
Redirect the user to the Supahub JWT endpoint with the jwt
and redirectTo
URL.
https://workspace-name.supahub.com/api/auth/sso?jwt=payload&redirectTo=https://workspace-name.supahub.com/changelog
Note: If you have custom domain implemented, the redirect URL will be:
https://feedback.yourdomain.com/api/auth/sso?jwt=payload&redirectTo=https://feedback.yourdomain.com/changelog
You can also pass the user and company data inside JWT token generation.
By combining private workspace settings with Single Sign-On (SSO), you can create a secure environment for your users. Follow the below steps:
Private Workspace Configuration
Enable private workspace settings to restrict public access. Go to Settings > General > Make Workspace Private.
Authenticate Users
Access through configured SSO integration ensures only verified users can submit and view feedback hub.
Enable seamless access to Supahub’s public hub by integrating Single Sign-On (SSO) with your app’s existing authentication credentials.
The Single Sign-On (SSO) feature allows your users to authenticate once and gain access to your feedback hub seamlessly. With SSO integration, you can enable your users to log in to Supahub using their existing credentials from your authentication system. This developer documentation will guide you through the steps to integrate SSO with Supahub.
Before you begin, make sure you have:
Here is a summary of the authentication flow:
redirectTo
parameter appended to the URL: https://yourdomain.com/sso/supahub?redirectTo=https://workspace-name.supahub.com/changelog
redirectTo
parameter passed along: https://workspace-name.supahub.com/api/auth/sso?jwt=payload&redirectTo=https://workspace-name.supahub.com/changelog
Set up a dedicated SSO page
Create a page on your website that will handle the authentication process. For example, you can use the URL: https://yourdomain.com/sso/supahub
. Alternatively, you can use your existing authentication page (login/signup). This page will receive and process authentication requests from Supahub.
Go to your Supahub Dashboard and navigate to the “Settings” section. Look for the SSO settings and enter the URL of the SSO page you created in the “SSO Redirect URL” field.
Once saved the “Login with YourWorkspaceName” button on your public hub’s navbar will be shown automatically.
Authenticate Users
When a user visits your SSO page, use your app’s authentication system to authenticate them. This could involve verifying their credentials or any other authentication mechanism you have in place.
Install JWT packages
Install the required packages for JWT token generation on your server.
Generate the JWT token
Copy and use the “Private Key” from SSO settings to generate a JWT token on your server.
Private Key should be kept secure and not to be shared. Add it in your .env file.
To enhance security measures, Single Sign-On (SSO) tokens are restricted from authenticating users with administrative privileges within any Supahub workspace. Instead, these users will need to log in using the dedicated portal at workspace.supahub.com
Redirect the user back to Supahub
Redirect the user to the Supahub JWT endpoint with the jwt
and redirectTo
URL.
https://workspace-name.supahub.com/api/auth/sso?jwt=payload&redirectTo=https://workspace-name.supahub.com/changelog
Note: If you have custom domain implemented, the redirect URL will be:
https://feedback.yourdomain.com/api/auth/sso?jwt=payload&redirectTo=https://feedback.yourdomain.com/changelog
You can also pass the user and company data inside JWT token generation.
By combining private workspace settings with Single Sign-On (SSO), you can create a secure environment for your users. Follow the below steps:
Private Workspace Configuration
Enable private workspace settings to restrict public access. Go to Settings > General > Make Workspace Private.
Authenticate Users
Access through configured SSO integration ensures only verified users can submit and view feedback hub.