Introduction
Okta Single Sign-On (SSO) enables secure authentication for users accessing the Oloid Portal and Oloid Applications. To complete the integration, admin first configure policies and applications in the Okta Admin Console and then share the required parameters with Oloid. This setup ensures that authentication requests are validated through Okta using the appropriate authorization policies and client configurations.
Prerequisite
You must have Admin access to the Okta Admin Console.
Steps to Configure Okta SSO login in the Okta Admin Console for Oloid Portal
Step 1: Configure Client Application for Oloid Portal and Oloid Application
Step 2: Create and Configure Default Policy in an authorization server in the Okta Admin Console
Steps to Create and Configure Client Application for Oloid Portal and Oloid Application:
In the Okta Admin Console, go to Applications > Applications > Create App Integration.
The Create a new app integration pop-up box is displayed.
Do the following:
Select OIDC - OpenID Connect as the Sign-in method.
Select Single-Page Application as Application type.
Click Next.
The New Single-Page App Integration page is displayed.
Enter a name for the application in the App integration name field.
Select Authorization Code as Grant type (If not already selected).
Add the redirected URLs to Sign-in redirect URIs field.
To copy the redirected URL, go to Oloid Portal > Tenant Settings > Security > OKTA and copy the following Redirect URLs.
Select Allow everyone in your organization to access under Assignments.
Click Save.
The newly created application page is displayed.
Go to General tab, share the ClientID of the new app with Oloid.
You can use the client ID in the Web Client ID field. You can find the web client ID field in the Oloid portal under User Profile > Tenant Settings > Security > Okta.
Go to User Profile icon and share the domain ID with Oloid.
You can use the Domain ID in the Domain field. You can find the Domain ID field in the Oloid portal under User Profile > Tenant Settings > Security > Okta.
On the left panel, select Security > API.
Under Authorization Server tab, share the Default Issuer URL with Oloid Admin.
You can use the Default Issuer URL in the Web Client ID field. You can find the web client ID field in the Oloid portal under User Profile > Tenant Settings > Security > Okta.
Steps to Create Default Policy
On the left menu panel, go to Security > API > Authorization Servers tab > Select default.
On the default page, select Access Policies > Add Policy.
The Add Policy pop-up box is displayed.
On the pop-up box, do the following:
Enter Name and Description in respective fields.
Select The following clients as Assign to and then enter the preferred application name in the respective field.
Note: Assign the policy only to the specific client application that you created in the first step.
Click Create Policy.
The access policy is created successfully.
Next, select Add rule.
On the Add Rule pop-up box, configure the details as required.
Click Create rule.
The rule is added successfully.
Related Document
Keywords
| Okta SSO Configuration | Oloid Okta SSO Setup | Okta Access Policy Setup |






