Steps to configure Okta SSO login in the Okta Admin Console for Oloid Portal:
Step 1: Create and Configure Default Policy in an authorization server in the Okta Admin Console
Step 2: Configure Client Application for Oloid Portal and Oloid Application:
Steps to create Default Policy:
On the left menu panel, go to Security > API > Authorization Servers tab > Select default.
On the default page, select Access Policies > Add Policy.
The Add Policy pop-up box is displayed.
On the pop-up box, do the following:
Enter Name and Description in respective fields.
Select All clients.
Click Create Policy.
The access policy is created successfully.
Next, select Add rule.
On the Add Rule pop-up box, configure the details as required.
Click Create rule.
The rule is added successfully.
Steps to configure Client Application for Oloid Portal and Oloid Application:
In the Okta Admin Console, go to Applications > Applications > Create App Integration.
The Create a new app integration pop-up box is displayed.
Do the following:
Enter a name for the application in the App integration name field.
Select Authorization Code as Grant type(If not already selected).
Go to Oloid Portal > Tenant Settings > Security > OKTA and copy the following Redirect URL.
Add the copied URLs to Sign-in redirect URIs field.
NOTE: Please reach out to Oloid Support to configure your tenant URL.
Select Allow everyone in your organization to access under Assignments.
Click Save.
The newly created application page is displayed.
Go to General tab, share the ClientID of the new app with Oloid.
Go to User Profile icon and share the domain ID with Oloid.
On the left panel, select Security tab > API.
Under Authorization Server tab, share the Default Issuer URL with Oloid Admin.
Related Document