Skip to main content
All CollectionsOloid Platform - Enterprise FeaturesCreate and Mange IDP Provider
Connecting your Oloid tenant to your Okta(OIDC) instance
Connecting your Oloid tenant to your Okta(OIDC) instance

This document provides information on how to configure Okta (OIDC) for Oloid SSO

Updated over 7 months ago

Add Identity Provider

Steps to add Identity Provider:

  1. On the home page of the Okta Admin Console, go to Security > Identity Providers.

  2. Select Add Identity Provider.

    The identity provider list is displayed.

  3. Select OpenID Connect and click Next.

    The Configure OpenID Connect IdP dialog box is displayed.

  4. Do the following

    1. Under General settings section:

      1. Name : Enter a name for the Identity Provider configuration.

      2. Scopes: Leave the defaults. These scopes are included when Okta makes an OpenID Connect request to the Identity Provider.

    2. Under Client details section:

      1. Enter Client ID.

        See Oloid Portal > Identity Provider > IDP Details > Meta Data tab for client ID

      2. Enter Client Secret.

        See Oloid Portal > Identity Provider > IDP Details > Meta Data tab for client secret.

    3. Under Endpoints section:

      1. Enter Issuer.

      2. Enter Authorization endpoint.

      3. Enter Token endpoint.

      4. Enter JWKS endpoint.

        See Oloid Portal > Identity Provider > IDP Details > Meta Data tab for respective data.

  5. Under Authentication Settings section,

    1. Select Automatic from Account Link Policy dropdown.

    2. If no match is found, select Redirect to Okta sign-in page option.

  6. Click Finish.

    The newly created IDP is listed under Security > Identity Providers.

    Note: In the search bar, you can search using identity provider name .

  7. Go to IDP details and copy IDP ID, Authorize URL, and Redirect URL and enter in Oloid Portal > Identity Provider > IDP Details > IDP Settings tab.

Add Client Application

Steps to add client application:

  1. In the Okta Admin Console, go to Applications > Applications.

  2. Select Create App Integration.

    The Create a new app integration pop-up box is displayed.

  3. Do the following:

    1. Select OIDC - OpenID Connect as the Sign-in method and Web Application as Application type.

    2. Select Next.

  4. In the next screen, configure the application.

    1. Under General Settings section,

      1. Enter App integration name.

      2. Select Authorization Code as Grant type (If not already selected).

    2. Under Sign-in redirect URIs section, add https://{yourOrg}.okta.com in the text field.

    3. Under Sign-out redirect URIs section, add https://{yourOrg}.okta.com in the text field. (Optional)

    4. Under Assignments section, select Allow everyone in your organization to access.

  5. Click Save. Add the ClientID and Client Secret of the new app in Oloid Portal > Identity Provider > IDP Details > IDP Settings tab.

  6. Configure the WebKey application in the Oloid Portal:

    1. On the homepage of the portal, select application to edit.

    2. On the application details page, select Details tab.

    3. Select IDP Profile from Select IDP Profile dropdown.

  7. Click Save.

  8. On the top-right corner, select Open login URL to view the configured WebKey application in your browser.

Did this answer your question?