Setting up Okta OIDC -OpenID Connect SSO
Perform the following steps to allow users signin via Okta. This is a two step process which requires setup in Okta and Perimeters application.
Step 1: Set up Okta to get 'Client ID' and 'Client Secret'.
Go to your Okta Administrator Portal with the required credentials.
Navigate to Applications -> Applications, from the left side panel.
Click “Create App Integration”.
Select “Sign-in method” value as “OIDC - OpenID Connect”.
Select “Application type” value as “Web Application”, and click next.
Assign a suitable “App Integration Name”.
Select “Grant type” value as “Client Credentials".
Fill in the Sign-in redirect URI and the Sign-out redirect URI.
Scroll down to Assignments and select “Skip group assignment for now” and click save.
Copy 'Client Id' and 'Secret Key' under 'Client Credentials' and 'Client Secrets'.
Also note the Issuer URL -
Okta provided - you will find this in the Account dropdown at the top right corner.
Custom - You will find this in customizations -> domain.
Step 2: Set up Perimeters with required configuration parameters.
Select 'Setup
Go to the 'Provide your Issuer URL' tab if you have followed the previous instructions to create Client ID and Client Secret. Paste the Issuer URL.
Paste the previously generated Client ID and Client Secret under Client ID and Secret Key, select Next, and continue to Claim Domain.
Enter the domain name used by users; it's essential for the correct redirection flow.
To validate the entered domain, Perimeters will perform a DNS challenge. Populate a new TXT record with Name and Value as shown in DNS configurations. This is an essential prerequisite to enable SSO on the domain.
Select 'Default SSO roles' and click Done.
Enable the domain for SSO.
Last updated