Parable provides the values marked from Parable during onboarding. If you don’t have them yet, contact support@askparable.com.
Choose your protocol
Most identity providers support both OIDC and SAML. OIDC is simpler to set up — use it unless your organization requires SAML.- OIDC
- SAML 2.0
OIDC application setup
Create a new Custom OIDC application in your identity provider with these settings:| Setting | Value |
|---|---|
| App name | Parable CMEK Access (or any name your team prefers) |
| Redirect URI | Provided by Parable |
| Login URL | Provided by Parable |
| Grant type | Authorization Code |
| Client authentication | Client Secret Basic |
| Scopes | openid, profile, email |
Create the OIDC application
In your IdP admin console, create a new custom OIDC application. Enter the Redirect URI and Login URL provided by Parable.
Assign users or groups
Assign the users or groups who should have access to your encryption keys. Anyone assigned to this application can sign in — you can add or remove users at any time without contacting Parable.
Send credentials to Parable
Share the following with your Parable contact (via a secure channel such as 1Password or your organization’s preferred method):
- Client ID
- Client Secret
- Issuer URL (e.g.
https://your-org.okta.com/orhttps://oauth.id.jumpcloud.com/)
Okta
Okta
- Go to Applications → Create App Integration → OIDC - OpenID Connect → Web Application
- Set the Sign-in redirect URI to the Redirect URI from Parable
- Under Assignments, assign the relevant users or groups
- Copy the Client ID and Client Secret from the app’s General tab
- Your Issuer URL is
https://your-org.okta.com/
Azure AD (Microsoft Entra ID)
Azure AD (Microsoft Entra ID)
- Go to App registrations → New registration
- Set the Redirect URI (Web) to the Redirect URI from Parable
- Under Certificates & secrets, create a new client secret
- Copy the Application (client) ID and the secret value
- Your Issuer URL is
https://login.microsoftonline.com/{tenant-id}/v2.0
JumpCloud
JumpCloud
- Go to SSO Applications → Add New Application → Custom OIDC App
- Set Redirect URI and Login URL from Parable
- Set Client Authentication Type to Client Secret Basic
- Check Email and Profile under Standard Scopes
- Assign your test user or group
- Copy the Client ID and Client Secret
- Issuer URL is
https://oauth.id.jumpcloud.com/
What happens after setup
Once Parable completes the federation:- You control access. Add or remove users from the SSO application in your IdP at any time. Changes take effect immediately — no Parable involvement needed.
- No Google account required. Your team signs in with their existing corporate credentials.
- No Terms of Service to accept. Federated users are temporary users of Parable’s GCP project, covered by Parable’s existing agreement with Google.