diff --git a/helmchart/single-sign-on/values.yaml b/helmchart/single-sign-on/values.yaml
index 24172e7ba8b57b69c6a1fc3c36394d4d90014cb3..9212b893ca3fdc227477f96de87062a234d9085c 100644
--- a/helmchart/single-sign-on/values.yaml
+++ b/helmchart/single-sign-on/values.yaml
@@ -164,7 +164,7 @@ kratos:
 
       selfservice:
         # TODO: Have to figure out a decent default
-        default_browser_return_url: https://stackspin.net
+        default_browser_return_url: http://localhost/login/login
 
         methods:
           link:
@@ -181,6 +181,9 @@ kratos:
           login:
             ui_url: http://localhost/login/login
 
+          settings:
+            ui_url: http://localhost/login/settings
+
           registration:
             ui_url: http://localhost/login/registration
 
@@ -223,11 +226,11 @@ hydra:
           issuer: https://sso.stackspin.example.net
         # hydra.hydra.config.urls.login is the uri that users are redirect to perform the
         # login operation. The FQDN used here needs to match the value of singleSignOnHost
-        login: https://sso.stackspin.example.net/login
+        login: https://sso.stackspin.example.net/login/auth
         # hydra.hydra.config.urls.consent is the uri that users are redirect to trigger
         # the consent/permission check. The FQDN used here needs to match the value of
         # singleSignOnHost
-        consent: https://sso.stackspin.example.net/consent
+        consent: https://sso.stackspin.example.net/login/consent
       secrets:
         # hydra.hydra.config.secret is used as a seed whenever cryptographic operations are
         # performed by hydra i.e. creation of a token.