It is not a standard parameter, but the authorization endpoint accepts a connection parameter that you may be able to use to achieve that requirement. By passing the name of the connection that is associated with the external OIDC IdP the authorization endpoint should redirect to the provider and skip a login page.
For a SAML client application the parameter is documented at (Authentication API Explorer), but there’s not much to it in terms of documentation. It should just be adding the parameter as a query string parameter and providing the name of a connection that is enabled for the application.
If you have an online sample that reproduces the issues or you can share a simplified trace of the requests then it may be possible to further look into what’s going on.