Parallels Browser Isolation Administrator's Guide
ProductsSupportPartnersDocumentation
  • About Parallels Browser Isolation
  • What's new
  • Parallels Browser Isolation licensing
  • Getting started
    • Activating a license key
    • Configuring an IdP
    • Configuring Parallels Browser Isolation
    • Adding users
    • Adding applications
    • Adding policies
  • Parallels Browser Isolation interface
    • Dashboard
    • Applications
    • Policies
    • Insights
    • User Management
  • Appendix
    • IdP configuration
      • Google OIDC Configuration
      • OKTA OIDC Configuration
      • Auth0 OIDC Configuration
      • Microsoft Entra OIDC Configuration
    • Known Issues
  • Providing feedback
Powered by GitBook

Social media

  • Facebook
  • Twitter
  • LinkedIn
  • YouTube

Other Resources

  • Feedback

© 2025 Parallels International GmbH. All rights reserved.

On this page
  • Step 1. Create an application
  • Step 2. Adding users
  • Step 3. IdP Configuration

Was this helpful?

Export as PDF
  1. Appendix
  2. IdP configuration

Auth0 OIDC Configuration

PreviousOKTA OIDC ConfigurationNextMicrosoft Entra OIDC Configuration

Last updated 10 months ago

Was this helpful?

Step 1. Create an application

  1. Log in to .

  2. Navigate to Getting started and click Create Application.

  3. Do one of the following:

    • If you don't have any specific requirements for your environment, select either Single Web Page Applications or Regular Web Applications.

    • If you know that your environment requires a specific type of application, select that type.

  4. Click Create.

  5. Select the Settings tab and copy the values of Client ID and Client Secret.

  6. In the Allowed Callback URLs field, specify https://pbi.parallels.com/rbi/oidc/signin/callback and https://pbi.parallels.com/owner/test-idp.

  7. Select the Endpoints tab in the Advanced settings section and copy the value of the OpenID Configuration field.

Step 2. Adding users

  1. In the left pane, navigate to Users under User Management.

  2. Navigate to Create Users and click Create User.

  3. Add the email and password of the user.

  4. (Optional) Verify the user's email:

    1. Click the three dots button.

    2. In Details, go to email and verify the email.

Step 3. IdP Configuration

  1. Once the above steps are completed, copy the values from which should mimic the table below, and paste them into the Parallels Browser Isolation IDP configuration section as shown below:

Settings
Value
Details

Domain

Ex: acme.com or parallels.com or <yourorgdomain.com>

The domain name should always match the value used in the email or UPN after the "@" symbol. [Ex; login using TestUser@pbi.parallels.com or TestUser@acme.com]

Discovery URL

Copy this value from Auth0 IDP Settings. It should follow the format specified in the Value Column

Client ID

******************

Copy this value from Auth0 IDP Settings

Client Secret

******************

Copy this value from Auth0 IDP Settings

Username Claim Name

For more info visit;

Groups Claim Name

groups

For more info visit;

  1. Click Save and proceed with adding users using the Admin Management section that was configured in the OIDC.

https://manage.auth0.com/
https://{Auth0domain}/.well-known/openid-configuration
name
https://auth0.com/docs/secure/tokens/json-web-tokens/create-custom-claims
https://auth0.com/docs/secure/tokens/json-web-tokens/create-custom-claims