Setup SSO with Rofim as the IdP

This page describes how to configure Single Sign-On (SSO) in the scenario where** Rofim acts as the Identity Provider** (IdP) and a partner application connects to Rofim as a relying party (RP). This setup allows users from the partner’s system to access Rofim services using their existing accounts, without managing separate credentials.

Glossary

TermeDescription
IdPIdentity Provider that authenticates and manages digital identities (here: Rofim)
SSOSingle Sign-On, a mechanism allowing users to access multiple systems using a single identity
OpenIDConnectAuthentication protocol built on top of OAuth 2.0
Relying Party (RP)The partner application relying on Rofim for user authentication.
ClaimKey-value pair containing user attributes (e.g. name, email, etc.)

Technical prerequisites

Rofim exposes an OpenID Connect Provider (OP) endpoint accessible from the partner system.

The partner must have an OIDC-compliant client configured (web app, backend service, or mobile app).

The partner must provide at least one Redirect URI that will be used for authentication callbacks.

Both systems must use HTTPS and secure token exchange mechanisms.

Security considerations

The partner delegates authentication to Rofim. Rofim is responsible for securely managing user identities and access.

Both sides must ensure compliance with local security and privacy standards (e.g. HDS, GDPR).

Two-factor authentication (2FA) is enforced by Rofim.

Token lifetime and scopes are managed by Rofim and should be aligned with the partner’s session policy.

SSO Setup

Principles

In this configuration:

  • Rofim acts as the OpenID Connect Provider (OP).
  • The partner acts as the Client (Relying Party, RP).
  • The authentication flow follows the standard OIDC Authorization Code Flow:
    • The partner redirects the user to Rofim for authentication.
    • The user authenticates with Rofim (login).
    • Rofim issues an ID Token and optionally an Access Token.
    • The tokens are sent to the partner via the configured Redirect URI.
    • The partner verifies and consumes the tokens to establish the session.

Configuration data provided by Rofim

Rofim will provide the following information to the partner in order to setup the SSO in its OP

DataValeur
Discovery URLOIDC well-known configuration endpoint.
ClientIDID du client configuré sur l'IdP Rofim
Secret (via lien sécurisé)Secret associated with the client (must be transmitted securely)

Scopes

Rofim will provide by default followings scope to the client. No other scope can be requested by the client.

ScopeDescription
openidMandatory for OIDC authentication
emailUsed for user identification and matching
partner_profilIncludes user attributes such as name, surname, RPPS, etc...

Claims

The following claims may be provided by Rofim to the partner. These claims are included either in the ID Token or can be retrieved via theUserinfo endpoint.

ClaimScopeDescription
emailemailPrimary email address (used for user reconciliation)
subopenidUnique ID of the user on Rofim
family_namepartner_profilexemple : Dupond
given_namepartner_profilexemple : Marc
formatted_namepartner_profilexemple : Dr. Marc Dupond
titlepartner_profilexemple : Dr.
initialspartner_profilexemple : MD
specialtypartner_profilSpeciality of the user, can be absent or empty
account_typepartner_profilType of account
countrypartner_profilCountry of the user
citypartner_profilCity of the user
RPPSpartner_profilRPPS of the user, if the user has one.

Configuration data provided by the Partner

DataValeur
Redirect URL(s)The URI(s) to which Rofim will redirect after successful login