Skip to main content

How to Create and Configure Okta (OIDC) as an Identity Provider in Okta Admin Console

This document provides information on how to configure Okta (OIDC) for Oloid SSO

Updated today

Introduction

This document provides instructions to configure Okta (OIDC) as an Identity Provider for Oloid Single Sign-On (SSO).

Prerequisites

  • You must have admin access to the Okta Admin Console

  • Okta OIDC (OpenID Connect) support enabled.

Steps to add Identity Provider

  1. On the home page of the Okta Admin Console, go to Security > Identity Providers.

  2. Select Add Identity Provider.

    The identity provider list is displayed.

  3. Select OpenID Connect and click Next.

    The Configure OpenID Connect IdP dialog box is displayed.

  4. Do the following

    1. Under General settings section:

      1. Name: Enter a name for the Identity Provider configuration.

      2. Scopes: Leave the defaults. These scopes are included when Okta makes an OpenID Connect request to the Identity Provider.

    2. Under Client details section:

      1. Enter Client ID.

      2. Enter Client Secret.

        Note: You can find the Client ID and Client Secret in the Tenant Admin Portal. On the Tenant Admin Portal, go to Identity Provider > IDP Details > Meta Data tab.

    3. Under Endpoints section:

      1. Enter Issuer.

      2. Enter Authorization endpoint.

      3. Enter Token endpoint.

      4. Enter JWKS endpoint.

        Note: You can find the Issuer, Authorization Endpoint, Token Endpoint and JWKS Endpoint in the Tenant Admin Portal. On the Tenant Admin Portal, go to Identity Provider > IDP Details > Meta Data tab.

  5. Under Authentication Settings section,

    1. Select Enable automatic linking from Account Link Policy.

    2. If no match is found, select Reject the authentication responses from IdP.

  6. Click Finish.

    The newly created IDP is listed under Security > Identity Providers.

    Note: In the search bar, you can search using identity provider name.

  7. Go to IDP details and do the following:

    1. Copy IDP ID and enter it in Tenant Admin Portal > Identity Provider > IDP Settings > IDP ID.

    2. Copy Redirect URl and enter it in Tenant Admin Portal > Identity Provider > IDP Settings > Callback URL.

    3. Enter https://{user-id}.okta.com/ in the Authorize URL and Redirect URL fields under Tenant Admin Portal > Identity Provider > IDP Settings. For example, https://dev-10453970.okta.com/

Add Client Application

  1. In the Okta Admin Console, go to Applications > Applications.

  2. Select Create App Integration.

    The Create a new app integration pop-up box is displayed.

  3. Do the following:

    1. Select OIDC - OpenID Connect as the Sign-in method and Web Application as Application type.

    2. Select Next.

  4. In the next screen, configure the application.

    1. Under General Settings section,

      1. Enter App integration name.

      2. Select Authorization Code as Grant type (If not already selected).

    2. Enter Sign-in redirect URIs.

      Note: The Sign-in redirect URls must be set to https://{yourOrg}.okta.com.

    3. Enter Sign-out redirect URIs (Optional).

      Note: The Sign-out redirect URls must be set to https://{yourOrg}.okta.com.

    4. Under Assignments section, select Allow everyone in your organization to access.

  5. Click Save.

    Add the ClientID and Client Secret of the new app in Tenant Admin Portal > Identity Provider > IDP Details > IDP Settings tab.

  6. Configure the IDP Profile in the Tenant Admin Portal:

    1. On the homepage of the portal, select the preferred IDP to edit.

    2. On the IDP details page, select the WebKey Application from Select WebKey Application dropdown.

  7. Click Save.

  8. On the top-right corner of the preferred WebKey application, select Open login URL to view the configured WebKey application in your browser.

Related Document


Keywords

| Oloid Okta SSO configuration | Configure Okta OIDC for Oloid | Okta OpenID Connect Oloid | Oloid Identity Provider Okta |

Did this answer your question?