Skip to main content

Connecting your Oloid tenant to your Okta(OIDC) instance

This document provides information on how to configure Okta (OIDC) for Oloid SSO

Updated this week

Add Identity Provider

Steps to add Identity Provider:

  1. On the home page of the Okta Admin Console, go to Security > Identity Providers.

  2. Select Add Identity Provider.

    The identity provider list is displayed.

  3. Select OpenID Connect and click Next.

    The Configure OpenID Connect IdP dialog box is displayed.

  4. Do the following

    1. Under General settings section:

      1. Name : Enter a name for the Identity Provider configuration.

      2. Scopes: Leave the defaults. These scopes are included when Okta makes an OpenID Connect request to the Identity Provider.

    2. Under Client details section:

      1. Enter Client ID.

        See Tenant Admin Portal > Identity Provider > IDP Details > Meta Data tab for client ID.

      2. Enter Client Secret.

        See Tenant Admin Portal > Identity Provider > IDP Details > Meta Data tab for client secret.

    3. Under Endpoints section:

      1. Enter Issuer.

      2. Enter Authorization endpoint.

      3. Enter Token endpoint.

      4. Enter JWKS endpoint.

        See Tenant Admin Portal > Identity Provider > IDP Details > Meta Data tab for respective data.

  5. Under Authentication Settings section,

    1. Select Enable automatic linking from Account Link Policy.

    2. If no match is found, select Redirect to Okta sign-in page option.

  6. Click Finish.

    The newly created IDP is listed under Security > Identity Providers.

    Note: In the search bar, you can search using identity provider name .

  7. Go to IDP details and do the following:

    1. Copy IDP ID and enter it in Tenant Admin Portal > Identity Provider > IDP Settings > IDP ID.

    2. Copy Redirect URl and enter it in Tenant Admin Portal > Identity Provider > IDP Settings > Callback URL.

    3. Enter https://{user-id}.okta.com/ in the Authorize URL and Redirect URL fields under Tenant Admin Portal > Identity Provider > IDP Settings. For example, https://dev-10453970.okta.com/

Add Client Application

Steps to add client application:

  1. In the Okta Admin Console, go to Applications > Applications.

  2. Select Create App Integration.

    The Create a new app integration pop-up box is displayed.

  3. Do the following:

    1. Select OIDC - OpenID Connect as the Sign-in method and Web Application as Application type.

    2. Select Next.

  4. In the next screen, configure the application.

    1. Under General Settings section,

      1. Enter App integration name.

      2. Select Authorization Code as Grant type (If not already selected).

    2. Under Sign-in redirect URIs section, add https://{yourOrg}.okta.com in the text field.

    3. Under Sign-out redirect URIs section, add https://{yourOrg}.okta.com in the text field. (Optional)

    4. Under Assignments section, select Allow everyone in your organization to access.

  5. Click Save. Add the ClientID and Client Secret of the new app in Tenant Admin Portal > Identity Provider > IDP Details > IDP Settings tab.

  6. Configure the IDP Profile in the Tenant Admin Portal:

    1. On the homepage of the portal, select the preferred IDP to edit.

    2. On the IDP details page, select the WebKey Application from Select WebKey Application dropdown.

  7. Click Save.

  8. On the top-right corner of the preferred WebKey application, select Open login URL to view the configured WebKey application in your browser.

Related Document

Did this answer your question?