Using OpenID Connect with Workspace ONE Access

We mostly talk about SAML with Workspace ONE but i’m asked occasionally if Workspace ONE Access can support OpenID Connect? The answer is yes, of course it can.  Just keep in mind before you start to configure OpenID Connect, Workspace ONE Access only supports the email, profile and user scopes.There is no support for custom scopes nor the ability to modify the attributes that are returned in the provided scopes.

Workspace ONE Access supports the Authorization Code Grant as well as Client Credentials. For OIDC, we only support Authorization Code.

Lets walk through the process to setup an OIDC Application. We are going to use the OpenID Debugger application from Auth0.

Create the SAAS Application

  1. In the Workspace ONE Administration Console, go to Catalog -> Webapps
  2. Click New
  3. Provide a Name: ie. OpenID TestApp
  1. Click Next
  2. Select OpenID Connect from the Drop List
  1. Complete the fields as per your application requirements.  The following is a sample for Auth 0 Client Connect App.

    Target URL

    This is just a web link to the target application
    Redirect URL
    If you need more than one redirect URL’s you can add them later. Only one will be accepted here.
    Client ID
    Enter any Client ID that will be used in the calling application. Do Not Use Spaces or special characters.
    Client Secret
    Enter a secret that will be used by the calling application.

  1. Click next
  2. Click Save
  3. Assign this application to your users.

Modify the Remote App Access Client

A remote app access client will automatically get created. We will need to modify this client.

  1. Go to Catalog -> Settings
  2. Click on Remote App Access
  1. In the Client List, look for the Client ID that was used in the earlier step. In my example, I used “MyOIDCTester”
  1. Click on the Client ID
  2. Under Scopes, Click Edit
  3. Select Email and Profile
  1. Click Save
  2. If you want to prompt the user to authorize the user grants, you will need to do the following steps: I will skip this step for now.
    1. Click Edit beside Client Configuration
    2. Select “Prompt Users for Access”

Testing with the Auth0 OpenID Connect Debugger

  1. Go to
  1. Click on Configuration
    Template Custom
    Discovery URL https://%5Btenant%5D//SAAS/auth/.well-known/openid-configuration
    Authorization Token Endpoint https://%5Btenant%5D/SAAS/auth/oauth2/authorizeie.
    Token Endpoint & Token Keys Endpoint https://%5Btenant%5B/SAAS/auth/oauthtoken
    OIDC Client IDMyOIDCTesterOIDC
    Client Secret ThisIsMySecretKey
    Scope email profile user openid

  1. Click Save
  2. Click Start
  1. When prompted to Authentication, select your domain based credentials (Do no use System Domain)
  1. If you selected “Prompt Users for Access” they will be prompted and required to Allow Access:
  1. You will now see your Authorization Code in the OIDC Debugger. Click Exchange to get your Access Token.
  1. You will now see your Bearer Token, ID Token and your Refresh Token.
  1. Click Next
  2. The ID Token will contain information regarding the identity. Click “View on JWT.IO” to see your JSON Tokens.
  1. You JWT Token will be displayed with your profile and user data:

2 thoughts on “Using OpenID Connect with Workspace ONE Access

  1. Hello, you mention that you can add another redirect URL later. How do you do that? I only see a single spot. Thank you!


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s