You can set up Single Sign-on (SSO) with Okta for your team. This section helps you to create an OIDC application with Okta. The Client ID, Client Secret, and Issuer URL of this OIDC application are required to setup SSO in Ona. See the Step-by-step guide for the general instructions.

Prerequisites

As prerequisites you will need the following:

Create an OIDC application

  1. On the Okta Admin dashboard, navigate to Applications
  2. Select Create App Integration
Applications - Okta Dashboard Applications - Okta Dashboard
  1. Select the following options and click Next
    • Sign-in method: OIDC - Open ID Connect
    • Application type: Web Application
Create App Integration - Okta Dashboard Create App Integration - Okta Dashboard
  1. Specify General Settings
    • App integration name, e.g. Ona
    • Sign-in redirect URIs: https://app.gitpod.io/auth/oidc/callback
    • Sign-out redirect URIs: none
Specify Okta settings - Okta Dashboard Specify Okta settings - Okta Dashboard
  1. Assignments
    • You have to select Okta users or groups which would be allowed to use the integration with Ona.
    • Okta lets you import and synchronize directories, which then can be assigned to use the integration.
Specify Assignments - Okta Dashboard Specify Assignments - Okta Dashboard
  1. Obtain Client ID, Client Secret from General tab
Configure Client Secrets - Okta Dashboard Configure Client Secrets - Okta Dashboard
  1. Obtain Issuer URL
Issuer - Okta Dashboard Issuer - Okta Dashboard
  1. Continue with the SSO configuration in Ona: Clicking Save & Test