Overview
This guide walks you through configuring Okta as your SSO identity provider using OpenID Connect (OIDC). Okta is ideal for enterprises needing advanced identity management features.
- Okta admin access (Super Admin or Application Admin role)
- Scalelite Manager Pro subscription (Pro or Enterprise tier)
- Your callback URL from the SSO Settings page
- Your Okta organization URL (e.g., yourcompany.okta.com)
1Access Okta Admin Console
Log in to your Okta Admin Console at https://yourcompany-admin.okta.com
Navigate to Applications → Applications → Create App Integration.
2Create OIDC Application
Select OIDC as the sign-in method and Web Application as the application type:
3Configure Application Settings
Enter your application details and redirect URI:
⚠️ Copy this exact URL from your SSO Settings page
4Copy Client Credentials
After saving, navigate to the General tab to find your credentials:
Client Credentials
0oa1b2c3d4e5f6g7h8i9j
AbCdEfGhIjKlMnOpQrStUvWxYz0123456789
Okta Domain
https://yourcompany.okta.com
Use this domain for the authorization and token endpoints
5Assign Users
Go to the Assignments tab and assign users or groups who can use this application:
- Everyone: All users in your Okta organization
- Groups: Specific groups (e.g., "Engineering", "Sales")
- Individual users: Specific users only
6Configure in Scalelite Manager
Return to your SSO Settings page and click "Add Provider".
- Select "Okta" as the provider type
- Enter a name (e.g., "Company Okta SSO")
- Paste your Client ID
- Paste your Client Secret
- Important: Update the Okta domain in the endpoint URLs:
- Replace
YOUR_OKTA_DOMAINwith your actual domain (e.g.,yourcompany)
- Replace
- Click "Save Provider"
7Enable and Test
After saving, click "Enable" and test the SSO login by signing in with an assigned Okta user account.
- "User not assigned" - Add the user to the application in Okta
- "Invalid redirect_uri" - Verify the redirect URI matches exactly
- "Invalid client" - Double-check your Client ID and Secret
Okta Endpoint Reference
For reference, here are the standard Okta OIDC endpoints:
Authorization URL: https://yourcompany.okta.com/oauth2/v1/authorize
Token URL: https://yourcompany.okta.com/oauth2/v1/token
UserInfo URL: https://yourcompany.okta.com/oauth2/v1/userinfo
Issuer: https://yourcompany.okta.com
Next Steps
- Return to SSO Settings
- Configure MFA policies in Okta for additional security
- Set up automatic user provisioning (SCIM) - Enterprise feature