<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Issue with configuring two different Multi-Provider SSO setups in Community Central forum</title>
    <link>https://www.servicenow.com/community/community-central-forum/issue-with-configuring-two-different-multi-provider-sso-setups/m-p/3172346#M2182</link>
    <description>&lt;P&gt;&lt;a href="https://www.servicenow.com/community/user/viewprofilepage/user-id/504424"&gt;@Najmuddin Mohd&lt;/a&gt;&amp;nbsp;Thanks for the article. I followed the steps and updated the &lt;STRONG&gt;SSO Source&lt;/STRONG&gt; field for external users with the &lt;STRONG&gt;IDP SysID&lt;/STRONG&gt;. However, when testing as an external user, I was still redirected to the internal user IDP (Microsoft IDP) instead of the intended OKTA IDP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After reviewing it again, I realised that when setting the &lt;STRONG&gt;SSO Source&lt;/STRONG&gt; field with the IdP in the user table, I needed to prepend &lt;STRONG&gt;sso:&lt;/STRONG&gt; to the beginning of the &lt;STRONG&gt;SysID&lt;/STRONG&gt;. This detail wasn’t mentioned in the article. Thanks again for your help!&lt;/P&gt;</description>
    <pubDate>Sun, 09 Feb 2025 02:16:48 GMT</pubDate>
    <dc:creator>Stephen25</dc:creator>
    <dc:date>2025-02-09T02:16:48Z</dc:date>
    <item>
      <title>Issue with configuring two different Multi-Provider SSO setups</title>
      <link>https://www.servicenow.com/community/community-central-forum/issue-with-configuring-two-different-multi-provider-sso-setups/m-p/3171886#M2176</link>
      <description>&lt;P&gt;We have a Multi-Provider SSO configuration on our instance. One IDP is set up for internal staff members using SAML with Microsoft Azure, which is set as the default and auto-redirect IDP. The other IDP is for external users, configured with OpenID Connect via OKTA.&lt;BR /&gt;External users access the system through a URL appended with /login and can click a button labeled "OKTA Login" to access the backend.&lt;/P&gt;&lt;P&gt;The issue arises when external users attempt to access the service portal. For instance, if a catalog item URL from the service portal is shared with an external user who is neither a resolver nor already logged in, the system redirects them to the default Microsoft IDP instead of the intended OKTA IDP.&lt;/P&gt;&lt;P&gt;How can we configure the system to recognize external users and direct them to the appropriate IDP without affecting the user experience?&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2025 17:21:25 GMT</pubDate>
      <guid>https://www.servicenow.com/community/community-central-forum/issue-with-configuring-two-different-multi-provider-sso-setups/m-p/3171886#M2176</guid>
      <dc:creator>Stephen25</dc:creator>
      <dc:date>2025-02-07T17:21:25Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with configuring two different Multi-Provider SSO setups</title>
      <link>https://www.servicenow.com/community/community-central-forum/issue-with-configuring-two-different-multi-provider-sso-setups/m-p/3172192#M2180</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://www.servicenow.com/community/user/viewprofilepage/user-id/203077"&gt;@Stephen25&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;&lt;BR /&gt;You can check the below article when using multiple Identity providers&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.servicenow.com/community/developer-forum/auto-redirect-users-to-correct-idp-when-using-multiple-identity/td-p/2542023" target="_blank"&gt;https://www.servicenow.com/community/developer-forum/auto-redirect-users-to-correct-idp-when-using-multiple-identity/td-p/2542023&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;If the above information helps you, Kindly mark it as Helpful and Accept the solution.&lt;BR /&gt;Regards,&lt;BR /&gt;Najmuddin.&lt;/P&gt;</description>
      <pubDate>Sat, 08 Feb 2025 12:11:16 GMT</pubDate>
      <guid>https://www.servicenow.com/community/community-central-forum/issue-with-configuring-two-different-multi-provider-sso-setups/m-p/3172192#M2180</guid>
      <dc:creator>Najmuddin Mohd</dc:creator>
      <dc:date>2025-02-08T12:11:16Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with configuring two different Multi-Provider SSO setups</title>
      <link>https://www.servicenow.com/community/community-central-forum/issue-with-configuring-two-different-multi-provider-sso-setups/m-p/3172346#M2182</link>
      <description>&lt;P&gt;&lt;a href="https://www.servicenow.com/community/user/viewprofilepage/user-id/504424"&gt;@Najmuddin Mohd&lt;/a&gt;&amp;nbsp;Thanks for the article. I followed the steps and updated the &lt;STRONG&gt;SSO Source&lt;/STRONG&gt; field for external users with the &lt;STRONG&gt;IDP SysID&lt;/STRONG&gt;. However, when testing as an external user, I was still redirected to the internal user IDP (Microsoft IDP) instead of the intended OKTA IDP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After reviewing it again, I realised that when setting the &lt;STRONG&gt;SSO Source&lt;/STRONG&gt; field with the IdP in the user table, I needed to prepend &lt;STRONG&gt;sso:&lt;/STRONG&gt; to the beginning of the &lt;STRONG&gt;SysID&lt;/STRONG&gt;. This detail wasn’t mentioned in the article. Thanks again for your help!&lt;/P&gt;</description>
      <pubDate>Sun, 09 Feb 2025 02:16:48 GMT</pubDate>
      <guid>https://www.servicenow.com/community/community-central-forum/issue-with-configuring-two-different-multi-provider-sso-setups/m-p/3172346#M2182</guid>
      <dc:creator>Stephen25</dc:creator>
      <dc:date>2025-02-09T02:16:48Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with configuring two different Multi-Provider SSO setups</title>
      <link>https://www.servicenow.com/community/community-central-forum/issue-with-configuring-two-different-multi-provider-sso-setups/m-p/3172349#M2183</link>
      <description>&lt;P&gt;&lt;a href="https://www.servicenow.com/community/user/viewprofilepage/user-id/203077"&gt;@Stephen25&lt;/a&gt;&amp;nbsp;is this setup correctly? -&amp;nbsp;&lt;SPAN&gt;no auto-redirect IDP should be enabled(Value of&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;glide.authenticate.sso.redirect.idp&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;system property should be empty)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Alternatively you can&amp;nbsp;bypass this step by making the “&lt;STRONG&gt;login_locate_sso.do&lt;/STRONG&gt;” page the initial login page.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Feb 2025 02:19:43 GMT</pubDate>
      <guid>https://www.servicenow.com/community/community-central-forum/issue-with-configuring-two-different-multi-provider-sso-setups/m-p/3172349#M2183</guid>
      <dc:creator>vishnudasl</dc:creator>
      <dc:date>2025-02-09T02:19:43Z</dc:date>
    </item>
  </channel>
</rss>

