Skip to main content

LinkedIn

Set up LinkedIn as a social login provider in SecureAuth Connect so users can sign in with their LinkedIn account.

Register LinkedIn as a provider

  1. In your workspace, go to Authentication > Providers.

  2. Click Create Connection.

  3. Filter by Social Providers and select LinkedIn. Create Connection page showing available social providers

  4. Choose a registration mode:

    ModeDescription
    EmbeddedUses a client application registered by SecureAuth. No developer portal registration required.
    Bring your OwnUses a client application registered by your organization. Requires registering an application in the LinkedIn Developer portal to obtain a Client ID and Client Secret.

    LinkedIn Configuration tab showing Embedded mode and Display order

Configuration

SettingDescription
NameDisplay name for this provider. Default: LinkedIn.
Display orderControls the position of this provider on the sign-in page. Default: 0.

Use Try Sign-in to test the LinkedIn sign-in flow. Use Delete Identity to remove this provider.

LinkedIn sign-in page shown when testing with Try Sign-in

Attributes

LinkedIn returns the following attributes after authentication:

Connector nameFriendly nameData typeScope
emailEmailStringID token
email_verifiedEmail verifiedBooleanID token
nameNameStringID token
given_nameGiven NameStringID token
family_nameFamily NameStringID token
picturePictureStringID token
localeLocaleStringID token

LinkedIn provides email_verified to confirm whether the user's email address has been verified, and picture containing the URL of the user's LinkedIn profile picture.

To add custom attributes, click + Add attribute.

Mappings

Default attribute mappings from LinkedIn to the SecureAuth authentication context:

SourceLinkedIn source nameSecureAuth target name
ID tokenEmailEmail
ID tokenEmail verifiedEmail verified
ID tokenNameName
ID tokenGiven NameGiven name
ID tokenFamily NameFamily name
ID tokenPictureURL of the profile picture

To customize, click + Add mapping or + Add static mapping.

Provisioning

Provisioning controls what happens when a user authenticates through LinkedIn.

Disabled

Users are not persisted in the user store. Authentication succeeds but no user record is created.

Just-in-Time Provisioning

Users are persisted in the user store on first login.

Identifier Correlation
Maps the incoming LinkedIn identity to an existing user. Default: LinkedIn Email ↔ Users Email.

Attribute Provisioning
Maps LinkedIn attributes to user profile fields. Defaults:

  • EmailEmail
  • Given nameFirst name
  • Family nameLast name

Provisioning tab with Just-in-Time Provisioning selected, showing Identifier Correlation and Attribute Provisioning

Pre provisioning mode

Users must already exist in the user store before they can authenticate. New users are not auto-created at login; they must be added via an offline process.

Authentication flow control
Select what happens when no matching user is found:

  • Deny – Terminate the authentication flow.
  • Allow – Proceed with the authentication flow.

Identifier Correlation
Maps the incoming LinkedIn identity to an existing user. Default: LinkedIn Email ↔ Users Email.

Attribute Provisioning
Maps LinkedIn attributes to user profile fields. Defaults:

  • EmailEmail
  • Given nameFirst name
  • Family nameLast name

Provisioning tab with Pre provisioning mode selected, showing Authentication flow control and Attribute Provisioning

Extensions

ExtensionDescription
Post Authentication scriptA server-side script that runs after LinkedIn authentication completes. Click Manage Script to configure.
Post Authentication applicationA custom application that receives a callback after LinkedIn authentication completes. Click Manage Custom App to configure.

See also