Simplify your login process with Yoma SSO integration! Partners can now integrate Yoma credentials into their websites for seamless access. With single sign-on, users only need one account to log in, making it easier and more secure to manage access across platforms.
To opt-in for SSO integration:
- Contact Yoma Support to request integration
- Receive your unique client ID for OAuth authentication
- Configure your platform using the instructions below
- Gain access to track login activity on your organization's dashboard
When reaching out to Yoma Support, include the following information:
- CLIENT_URL: The URL of your site (e.g., https://www.example.com)
- CLIENT_URL_REDIRECT: The redirect URI for handling authentication (e.g., exampleauth://yomaredirect)
This ensures Support can generate a client ID tailored to your setup.
Specify a redirect URI that will handle the authentication response on your platform. Ensure this URI matches the one you provided when requesting the client ID.
Use the following authentication URL:
https://stage.yoma.world/auth/realms/yoma/protocol/openid-connect/auth
https://yoma.world/auth/realms/yoma/protocol/openid-connect/auth
Include these parameters in your authentication URL:
Parameter | Value | Description |
---|---|---|
client_id |
Your assigned ID | The client ID provided by Yoma Support |
redirect_uri |
Your redirect URI | The URI handling authentication responses |
response_type |
code |
The type of response expected |
scope |
openid email profile yoma-api phone |
The data access being requested |
In your platform's authentication settings, add the client ID, redirect URI, and authentication URL. Refer to your platform's documentation for specific configuration steps.
This testing process applies to the STAGE environment (for PROD, remove the .stage
prefix from URLs):
-
Open Tab 1 at the following URL (login page):
https://stage.yoma.world/auth/realms/yoma/protocol/openid-connect/auth?client_id=[your_clientId]&redirect_uri=[your_redirect_uri]&response_type=code&scope=openid+email+profile+yoma-api+phone
-
Open Tab 2 at this URL (opportunity page):
https://v3app.stage.yoma.world/opportunities/24f87c7c-fce2-4343-be7e-5c773ebc5483
-
Ensure you are logged out of Yoma
-
Log in on Tab 1
-
Refresh Tab 2
Expected Behavior: The "Sign In" button should still appear, not your profile button.
In your authentication setup, use this URL structure:
../auth
Replace [your_clientId]
and [your_redirect_uri]
with your actual values.
- Once the Keycloak client ID is configured, you can update the outbound client ID in your administrative dashboard
- Important: Inbound SSO (letting users log in to Yoma using third-party credentials) is reserved for future use and is not recommended at this time
For more details on architecture, design decisions, and component guidelines, please refer to our documentation.