Skip to content
Talk to an Engineer Dashboard

Okta - OIDC

Learn how to set up OpenID Connect (OIDC) Single Sign-On (SSO) using Okta as your identity provider, with step-by-step instructions for app integration setup.

This guide walks you through configuring Okta as your OIDC identity provider for your application. You’ll create an OIDC app integration in Okta, connect it to the SSO Configuration Portal, assign access, test the connection, and then enable Single Sign-On.

  1. Log in to your Okta Admin Console. Go to Applications -> Applications.

    Open the Applications page in Okta Admin Console

    In the Applications tab, click on Create App Integration.

    Create a new app integration in Okta

    Select OIDC - OpenID Connect as the sign-in method and Web Application as the application type, then click Next.

    Select OIDC web application in Okta

  2. In the app configuration form, enter an app name. Set app name in Okta

    From the SSO Configuration Portal, copy the Redirect URI under Service Provider Details. Copy Redirect URI from the SSO Configuration Portal

    Back in Okta, paste this value into Sign-in redirect URIs. Add Redirect URL to Okta

    Scroll down to the Assignments section. Select Limit access to selected groups and assign the appropriate groups to the application. The group assignment can be edited later. Assign required groups to the application in Okta

  3. After the app integration is created, copy Client ID and Client Secret from the General tab in Okta: Copy client credentials from Okta

    Add these values under Identity Provider Configuration in the SSO Configuration Portal: Add client credentials in SSO configuration portal

    Click the profile section in the top navigation bar in Okta and copy the Okta Tenant Domain. We will use this value to construct the Issuer URL. Copy Okta tenant domain from profile menu

    Construct the Issuer URL using the following format: https://[okta-tenant-domain]

    Add this Issuer URL in the SSO Configuration Portal: Add Issuer URL in SSO configuration portal

    Once all values are entered, click Update. Completed IdP configuration in the SSO Configuration Portal

  4. In Okta, go to the Assignments tab.

    Assign people or groups to the Okta app integration

    Click Assign, then choose Assign to People or Assign to Groups. Assign the appropriate people or groups to this integration and click Done. Assign users or groups to the Okta app

  5. In the SSO Configuration Portal, click Test Connection. If everything is configured correctly, you will see a Success response.

  6. Click Enable Connection to allow assigned users to sign in through Okta OIDC. Enable connection

    This completes the Okta OIDC SSO setup for your application.