How It Works
- A user on your platform clicks a link to access CookieChimp.
- They are redirected to your identity provider (IdP) to authenticate.
- After successful authentication, the IdP redirects the user to CookieChimp’s callback URL with an authorization code.
- CookieChimp exchanges the code for an ID token, extracts user info and group/tenant claims, and signs the user in.
SSO Callback URL
Each partner SSO provider has a dedicated callback URL:{provider_name} is assigned during partner onboarding. Both GET and POST methods are accepted on the callback URL.
OpenID Connect Configuration
CookieChimp uses OIDC Discovery to automatically fetch your IdP’s configuration. We support both Auth0 and Keycloak as identity providers. To set up SSO, provide the following to CookieChimp:| Parameter | Description |
|---|---|
| Issuer URL | Your OIDC issuer (e.g. https://your-tenant.eu.auth0.com/ or https://auth.yourdomain.com/realms/your-realm) |
| Client ID | The OIDC client identifier |
| Client Secret | The OIDC client secret |
openid, email, profile.
JWT Custom Claims for Group Management
CookieChimp reads a custom claim from the ID token to automatically manage group (workspace) membership. Your IdP should include the following claim in the JWT:- Find or create a Group matching the
external_idfor your partner - Update the group name if it has changed
- Grant the user access to the group for the duration of their session
Group membership from SSO is session-based. Each time a user logs in via SSO, their group access is refreshed from the JWT claims. This ensures access is always in sync with your platform.
User Provisioning
When a user logs in via SSO for the first time, CookieChimp automatically:- Creates a new user account using the email and name from the ID token
- Links the SSO identity so future logins are seamless
- Sets the user as partner-managed — the user’s account is flagged as managed by your partner, which adjusts available features in the UI
- Creates group memberships based on the JWT roles claim
Partner-Managed Users
Users who sign in via partner SSO are marked asmanaged_by_partner. This affects their experience:
- Team member management is handled at the group level rather than per-account
- Users cannot invite individual team members to accounts (managed through your platform instead)
- Password management is handled by your IdP
Initiating SSO Login
To send users from your platform to CookieChimp, redirect them to:Setting Up SSO
To configure SSO for your partner integration:- Contact support@cookiechimp.com with your IdP details
- Provide your OIDC issuer URL, client ID, and client secret
- Configure the callback URL in your IdP:
https://cookiechimp.com/users/auth/{provider_name}/callback - Add the
https://cookiechimp:com/rolescustom claim to your ID tokens - Test the flow in a development environment before going live