- 28 May 2024
- 3 Minutes to read
- Print
Configure OIDC Application In OKTA
- Updated on 28 May 2024
- 3 Minutes to read
- Print
In this Article
This article explains the steps to configure OIDC Application in OKTA.
Set up an OIDC Application in OKTA
Login to Okta (https://okta.com), click on Admin
Select Applications from left menu and click Create App Integration
Select Sign-In method as OIDC - OpenID Connect and Application type as Web Application and click next.
A New Web App Integration window will be opened. We need to fill in the details as mentioned below:
Enter the App integration name e.g.: SaaSify App
Select Grant types - Authorization Code and Implicit (hybrid)
In Sign-In redirect URIs, and Sign-out redirect URIs use Add URI action to add the below URLs
Sign-In redirect URIs : Remove the existing Sign-In redirect URI i.e http://localhost:8080/authorization-code/callback and add the below as per your environment:
https://api-demo.saasify.ai/authorization-code/callback (This is valid for UAT tenants. Production URLs will be shared by the SaaSify team).
Sign-out redirect URIs : Remove the existing Sign-out redirect URI i.e http://localhost:8080 and add the below as per your environment:
https://<your-custom-domain-name>.saasify.ai/welcome - (This will be provided by SaaSify Team)
Under the controlled access, select the option as applicable.
If you select “Allow everyone in your organization to access” then you need to check the box for “Enable immediate access with Federation Broker Mode” or if you select “Limit access to selected groups” then you need to enter “Selected group(s)”
For testing purposes you can select “Allow everyone in your organization to access” then you need to check the box for “Enable immediate access with Federation Broker Mode.”
Click Save
A new integration App will be created with the name SaaSify App.
We need to capture the details mentioned below and give to SaaSify team; This information is securely managed in key vault.General section: Client ID and Client Secret
Profile Section: Okta Domain name
Note :
Please share Client ID and Client Secret, Okta Domain name with SaaSify PSM Team.
API section
Navigate to Security section and select API.
In the API menu, select the "Authorization Servers" option.
You will see a list of authorization servers configured in your Okta account.
Ensure the default Authorization Service is Active.
Next Step
Follow the steps in next page to Add users in OKTA.