Skip to content

OpenID Authentication

Preview Roles: Workspace admin, Security reviewer Platforms: Web Reviewed: 2026-03-14

Use OpenID authentication when your organization needs a managed sign-in flow instead of ad hoc personal accounts. This is the right path when identity, approval rules, and account lifecycle should follow your existing corporate provider.

  • Confirm which identity provider is the source of truth.
  • Decide whether Hyper should allow mixed login methods or enforce managed identity only.
  • Review join settings, required 2FA, and guest policy before pilot users start signing in.
  • Organization-wide sign-in policy.
  • Restricted workspaces that should not allow unmanaged personal identity paths.
  • Security reviews where admin control over authentication is required.
  1. Connect and validate the provider in a pilot workspace.
  2. Test the full path for new members, returning members, and removed users.
  3. Confirm how workspace membership, team mapping, and meeting access behave after sign-in succeeds.
  4. Expand only after support knows how to diagnose identity mismatches.

Sign-in succeeds, but the user lands in the wrong place

Section titled “Sign-in succeeds, but the user lands in the wrong place”
  • Check whether the provider assertion maps to the intended workspace identity.
  • Confirm the user belongs to the right workspace or team after authentication.
  • Review approval, domain, and guest rules if identity succeeds but workspace entry is still blocked.