App connectors · App connectors
Zoom — Thoryn as an OAuth 2.0 IdP
Zoom Enterprise SSO via Thoryn. Workspace Admin pastes client credentials; users SSO into Zoom Web + Desktop + Mobile.
- zoom
- oidc
- communication
Tested against:hub: 1.0.0zoom: 2026 Q1
What you get
Zoom users sign in with Thoryn-issued tokens. Web, desktop, and mobile clients all use the same OIDC flow; Zoom JIT-provisions accounts on first login.
Setup
1. In Thoryn
hub clients create \
--name "Zoom" \
--redirect-uri "https://api.zoom.us/oauth/sso/callback" \
--grant-types authorization_code \
--scopes "openid email profile"2. In Zoom
Account Settings → Single Sign-On → Configure. Switch to OIDC mode (instead of SAML, which is the default), and fill in:
| Field | Value |
|---|---|
| Issuer URL | https://hub.thoryn.org |
| Client ID | (from step 1) |
| Client Secret | (from step 1) |
| Scope | openid email profile |
3. Claim mapping
| Zoom field | Thoryn claim |
|---|---|
email | email |
firstName | given_name |
lastName | family_name |
Caveats
- Zoom OIDC requires Business+ plan. Pro and Free workspaces only get pre-built Google/Apple/Facebook providers.
- Email match: Zoom matches users by email; if Hub issues a different email later (rename), Zoom may create a duplicate user. Disable email change in Hub's IdP for Zoom-using populations.