---
title: Custom OIDC SSO
slug: /deployment/security/custom-oidc
---
# Custom OIDC SSO
Follow the sections in this guide to set up Custom OIDC SSO.
- Go to the console of your preferred custom OIDC SSO provider
- Create an OIDC client application with implicit flow enabled to get a client ID.
### Create Client ID and Secret Key
- Navigate to your preferred OIDC provider console and create an OIDC client application.
- Generate client ID and secret key in JSON format.
After the applying these steps, you can update the configuration of your deployment:
  
    Configure Custom OIDC SSO for your Docker Deployment.
  
  
    Configure Custom OIDC SSO for your Bare Metal Deployment.
  
  
    Configure Custom OIDC SSO for your Kubernetes Deployment.
  
## Configure Ingestion
After everything has been set up, you will need to configure your workflows if you are running them via the
`metadata` CLI or with any custom scheduler.
When setting up the YAML config for the connector, update the `workflowConfig` as follows:
```yaml
workflowConfig:
  openMetadataServerConfig:
    hostPort: 'http://localhost:8585/api'
    authProvider: custom-oidc
    securityConfig:
      clientId: '{your_client_id}'
      secretKey: '{your_client_secret}'
      domain: '{your_domain}'
```