- Configure redirect URI:
https://<host>/auth/oidc/callback.
- Set:
TW_OIDC_ISSUER
TW_OIDC_CLIENT_ID
TW_OIDC_CLIENT_SECRET
TW_OIDC_REDIRECT_URI
- Optional claim overrides:
TW_OIDC_EMAIL_CLAIM
TW_OIDC_NAME_CLAIM
TW_OIDC_GROUPS_CLAIM
TW_OIDC_ROLES_CLAIM
TW_OIDC_MFA_CLAIM
- Configure role mapping:
TW_SSO_ROLE_MAPPING=external_group=internal_role,...
- Download SP metadata from
https://<host>/auth/saml/metadata.
- Configure IdP to POST assertions to
https://<host>/auth/saml/acs.
- Set:
TW_SAML_ENTITY_ID
TW_SAML_ACS_URL
TW_SAML_IDP_SSO_URL
TW_SAML_CERTIFICATE
- Optional:
TW_SAML_PRIVATE_KEY (required for encrypted assertions)
TW_SAML_IDP_SLO_URL
TW_SAML_EXPECTED_ISSUER
TW_SAML_REQUIRE_MFA
- Always require TLS termination.
- Keep
TW_OIDC_REQUIRE_MFA=true and TW_SAML_REQUIRE_MFA=true for privileged tenants.
- Use least-privilege role mappings.
- Rotate OIDC client secrets and SAML certificates regularly.