--- title: Custom OIDC SSO slug: /deployment/security/custom-oidc --- # Custom OIDC SSO Follow the sections in this guide to set up Custom OIDC SSO. - Go to the console of your preferred custom OIDC SSO provider - Create an OIDC client application with implicit flow enabled to get a client ID. ### Create Client ID and Secret Key - Navigate to your preferred OIDC provider console and create an OIDC client application. - Generate client ID and secret key in JSON format. After the applying these steps, you can update the configuration of your deployment: Configure Custom OIDC SSO for your Docker Deployment. Configure Custom OIDC SSO for your Bare Metal Deployment. Configure Custom OIDC SSO for your Kubernetes Deployment. ## Configure Ingestion After everything has been set up, you will need to configure your workflows if you are running them via the `metadata` CLI or with any custom scheduler. When setting up the YAML config for the connector, update the `workflowConfig` as follows: ```yaml workflowConfig: openMetadataServerConfig: hostPort: 'http://localhost:8585/api' authProvider: custom-oidc securityConfig: clientId: '{your_client_id}' secretKey: '{your_client_secret}' domain: '{your_domain}' ```