How to set up SSO with OIDC

In this article, we'll explain how to configure your Datawrapper workspace so you can use OIDC-based Single Sign-On. If you use SAML-based SSO, you'll want to read our article on How to set up SSO with SAML, instead.

Single Sign-On is available for users on the Enterprise plan.
You can find more information about our pricing options here.

To use SSO with OIDC, you'll first have to set up a new app integration in your Identity Provider of choice and then navigate to the app's OIDC settings. Below, we've linked guides on how to do so for some common IdPs:

Once you are ready to enter the OIDC settings information for your integration, follow these steps:

1

Open your Datawrapper workspace settings and navigate to the Single Sign-On section. Enable the Enable Single-Sign-On switch and select OpenID Connect as protocol:

2

In your identity provider's OIDC settings, specify the following values for the Sign-in redirect URL (aka. Redirect URI):

https://app.datawrapper.de/signin/sso
3

In your identity provider's settings, retrieve the provider domain (might also be called domain name), the client ID (might also be called application ID), and the client secret.

4

Copy these values into the Provider domain, Client ID, and Client Secret in Datawrapper:

5

Once everything is filled in, the team signin URL at the very bottom of the page is ready to be used for signing into Datawrapper with your identity provider:

Last updated on October 10th, 2025