- Home
- Single Sign-On and MFA
- Configuring SSO Connections
- Identity Providers
- Current: Configuring LinkedIn as an Identity Provider
Configuring LinkedIn as an Identity Provider
The EmpowerID SSO framework allows you to configure LinkedIn as an identity provider for the EmpowerID Web application. EmpowerID integrates with LinkedIn using the OAuth protocol to allow your users to log in to EmpowerID using their LinkedIn accounts.
For specific directions on registering EmpowerID as an application in LinkedIn, see the information provided by LinkedIn at https://linkedin.com/secure/developer.
https://FQDN_OF_YOUR_EMPOWERID_SERVER/EmpowerIDWebIdPForms/Login/EmpowerIDWebSite/LinkedIn?returnUrl=%2FEmpowerIDWebIdPForms%2F
This topic describes how to configure an IDP connection for LinkedIn and is divided into the following activities:
- Adding the Consumer Key and Consumer Secret to the LinkedIn OAuth Connection
- Adding MFA Points to the LinkedIn OAuth Connection
- Adding a Login tile for LinkedIn
- Testing the LinkedIn Connection
To add the API Key and API Secret and to the LinkedIn OAuth Connection
From the Navigation Sidebar of the EmpowerID Web interface, navigate to the OAuth Application management page by expanding Admin > SSO Connections and clicking OAuth. From the OAuth Applications management page, click the OAuth Service Provider tab and then search for LinkedIn. From the OAuth Service Provider grid, click the LinkedIn link. In the External OAuth Provider Details page that appears, click the Edit button for the specific LinkedIn connection you want to edit. By default, EmpowerID includes one connection. However, you can add as many connections for LinkedIn as your organization needs.To add MFA points to the LinkedIn application
From the External OAuth Providers page for LinkedIn, click the Provider Edit link at the top of the page. In the MFA Point Value field, type the number of MFA points you want to give to users logging in with LinkedIn. Click Save.Next, add a login tile for LinkedIn to the desired IdP Domains. This allows your users to authenticate to EmpowerID with their LinkedIn credentials. If you have not set up an IdP Domain for your environment, you can do so by following the directions in the below drop-down.
- To create an IdP Domain
- From the Navigation Sidebar, navigate to the SSO Components management page by expanding Admin > Applications and Directories > SSO Connections and clicking SSO Components.
- Click the IdP Domains tab and then click the Add IdP Domain (+) button.
- Type the fully qualified domain name in the Domain Name field and then click Save.
To add a login tile for LinkedIn
- From the Navigation Sidebar, navigate to the SSO Components management page by expanding Admin > Applications and Directories > SSO Connections and clicking SSO Components.
- In the IdP Domain Details page that appears, click the External OAuth Providers tab and check the box beside LinkedIn.
- Click Save.
To test the LinkedIn IdP Connection
- From the Navigation Sidebar, navigate to the Workflows page by expanding IT Shop and clicking Workflows.
- From the Workflows page, recycle the EmpowerID App Pools by clicking Recycle EmpowerID App Pools.
- Log out of the EmpowerID Web interface and navigate your browser to the domain name you configured for the LinkedIn IdP connection.
- Click the Login using LinkedIn button.
- In the Authorize page for LinkedIn that appears, enter your LinkedIn credentials (if you are not already signed in) and then click Allow access to allow EmpowerID to retrieve the necessary information to link the LinkedIn account to your EmpowerID identity (Person object).
- Back in the EmpowerID Web interface, click Yes to indicate that you have an EmpowerID login.
- Type your EmpowerID Login or Email in the form and click Submit. The EmpowerID Person must have a valid email address as EmpowerID sends a one-time password to that address.
- Check your email for the one-time password.
- Back in the EmpowerID Web interface, type the one-time password into the Password field of the One-Time Password Validation form and click Submit.
- Related Topics
Administrative Procedures:
- Creating IdP Domains
- Configure AD SF as an Identity Provider
- Configure Azure as an Identity Provider
- Configure Box as an Identity Provider
- Set up the Remote Windows Identity Provider Application
- Configure Facebook as an Identity Provider
- Configure Github as an Identity Provider
- Configure Google as an Identity Provider
- Configure Paypal as an Identity Provider
- Configure Smart Card as an Identity Provider
- Configure Twitter as an Identity Provider
- Configure Windows Auth as an Identity Provider
- Configure Yahoo as an Identity Provider
- Configure Yammer as an Identity Provider
- Creating IP Address Ranges
- Setting MFA Points Granted by SSO Connections