You can set up Single Sign-on (SSO) with Okta for your team. This section helps you to create an OIDC application with Okta. The Client ID, Client Secret, and Issuer URL of this OIDC application are required to setup SSO in Ona. See the step-by-step guide for the general instructions.Documentation Index
Fetch the complete documentation index at: https://ona.com/docs/llms.txt
Use this file to discover all available pages before exploring further.
Prerequisites
As prerequisites you will need the following:- Access to your Okta instance
- Permission to create an app integration
Create an OIDC application
- On the Okta Admin dashboard, navigate to Applications.
- Select Create App Integration.
-
Select the following options and click Next:
- Sign-in method:
OIDC - Open ID Connect - Application type:
Web Application
- Sign-in method:
-
Specify General Settings
- App integration name, e.g.
Ona - Sign-in redirect URIs:
https://app.gitpod.io/auth/oidc/callback - Sign-out redirect URIs:
none
- App integration name, e.g.
-
Assignments
- Select Okta users or groups which would be allowed to use the integration with Ona.
- Okta lets you import and synchronize directories, which then can be assigned to use the integration.
- Obtain Client ID and Client Secret from the General tab.
-
Obtain Issuer URL
- Navigate to Security > API in the Okta Admin dashboard.
- Copy the Issuer URI of the authorization server you want to use.
- Continue with the SSO configuration in Ona: Clicking Save & Test