<aside> <img src="/icons/book_orange.svg" alt="/icons/book_orange.svg" width="40px" /> Welcome to the online product documentation of the Quill eSigning and eSealing platform.

For more info about acquiring access to the platform, please contact [email protected], or check the **Quill page on our website.**

Also check

Quill welcome page

Onboarding checklist

Application notes

User roles

🌐 Release notes

🌐 **General Terms and Conditions EN - Algemene voorwaarden (NL) - Conditions générales (FR)**

🌐 **Privacy Statement EN - Privacyverklaring (NL) - Politique de confidentialité (FR)**

🌐 **API documentation Production - API documentation QA**

</aside>

Introduction

By following the steps outlined in this manual, administrators can easily configure OpenID Connect (OIDC) settings in Quill, enabling seamless authentication through Azure Single Sign-On (SSO) or other identity providers. This configuration enhances security and simplifies the user login process by integrating external identity verification systems. Additionally, features like automatic user creation and logo customization provide flexibility in managing new users and ensuring a branded experience. Once configured, this setup will streamline user access while maintaining high security standards for your organization.

Register the application with the microsoft identity platform

You must first register an application in the Microsoft Entra admin center. This gives us a Client ID which is to be used for the configuration in Quill.

Documentation of how to register an application can be found  https://learn.microsoft.com/en-us/entra/identity-platform/quickstart-register-app

The URL to whitelist is https://[company].quill-qa.dioss.io for QA and https://[company].quill.dioss.com for production. This can be done via 1 registration or separate for both QA and production.

A client secret credential must also be created as a tenant ID. How to look up the tenant ID can be found at https://learn.microsoft.com/en-us/entra/fundamentals/how-to-find-tenant.

Note: We strongly prefer to have you configure these fields in Quill so that we do not come into contact with this sensitive information. For this we can invite someone who must create a classic account (email / password) to do this configuration.

Setup in Quill

Step 1: Access the OIDC Configuration Section

1.       Log in to the Quill system as an admin.

  1. Navigate to the company settings section where OIDC configurations are managed.

https://lh7-rt.googleusercontent.com/docsz/AD_4nXd-fbAzAPhVbD9LXYdaqqCCYtMJ9tZG-qw67q6JTNuR1MiF8KC6hfXLEmfWqleCE34ZylTlsZXI8EVDwopl9ifvuVIzkjVt7JB742_aRMbHwBANg4VJoG_Mqk8KPPX7OVq5Hmk5zPunwnQh04DDqCmkZHFruymTnXAtun8yCw?key=79epQMLVQ5CUpNFaA6kErQ

  1. In the OIDC Configurations screen, click on the green Create button to add a new configuration or select an existing configuration for editing.

https://lh7-rt.googleusercontent.com/docsz/AD_4nXdEGbJjTNa2fWt-cfe6w-mylbPIHHVqVifjf3Gy-v9QetfZjNKxHfhrYZAlprNDDLrd5JvNqfozJsfmXPlhheo9tKyuG73T1izym1cWikYL0eHVBhi9qXneV7WewpMKqGyTXUZa9Y6k-ad6_qVWZ65hWF2s5E8YbuwEI3cc?key=79epQMLVQ5CUpNFaA6kErQ

Step 2: Fill in the Configuration Details

  1. Name of the OIDC Configuration

Input the name of the OIDC configuration. This will help you identify it later. In this case, the name entered is Azure SSO.

  1. Server Configuration