Skip to Content
Back to Single Sign-On (SSO)
Single Sign-On (SSO) SSO Security

Configure Okta SSO

Step-by-step guide to set up Okta OIDC for enterprise identity management

Overview

This guide walks you through configuring Okta as your SSO identity provider using OpenID Connect (OIDC). Okta is ideal for enterprises needing advanced identity management features.

Prerequisites:
  • Okta admin access (Super Admin or Application Admin role)
  • Scalelite Manager Pro subscription (Pro or Enterprise tier)
  • Your callback URL from the SSO Settings page
  • Your Okta organization URL (e.g., yourcompany.okta.com)

1Access Okta Admin Console

Log in to your Okta Admin Console at https://yourcompany-admin.okta.com

Admin Console
Dashboard Applications Directory Security Workflow
Applications
Manage your organization's applications

Navigate to ApplicationsApplicationsCreate App Integration.

2Create OIDC Application

Select OIDC as the sign-in method and Web Application as the application type:

Create a new app integration
OIDC - OpenID Connect
Modern authentication
SAML 2.0
Legacy federation
🌐
Web Application
📱
Native
SPA

3Configure Application Settings

Enter your application details and redirect URI:

New Web App Integration
General Settings Sign-on Options Assignments
Upload

⚠️ Copy this exact URL from your SSO Settings page

4Copy Client Credentials

After saving, navigate to the General tab to find your credentials:

Scalelite Manager Pro
General Sign On Assignments
✓ Application integration created successfully

Client Credentials

0oa1b2c3d4e5f6g7h8i9j
AbCdEfGhIjKlMnOpQrStUvWxYz0123456789
⚠️ Keep your client secret secure. Never share it publicly or commit it to version control.

Okta Domain

https://yourcompany.okta.com

Use this domain for the authorization and token endpoints

5Assign Users

Go to the Assignments tab and assign users or groups who can use this application:

  • Everyone: All users in your Okta organization
  • Groups: Specific groups (e.g., "Engineering", "Sales")
  • Individual users: Specific users only

6Configure in Scalelite Manager

Return to your SSO Settings page and click "Add Provider".

  1. Select "Okta" as the provider type
  2. Enter a name (e.g., "Company Okta SSO")
  3. Paste your Client ID
  4. Paste your Client Secret
  5. Important: Update the Okta domain in the endpoint URLs:
    • Replace YOUR_OKTA_DOMAIN with your actual domain (e.g., yourcompany)
  6. Click "Save Provider"

7Enable and Test

After saving, click "Enable" and test the SSO login by signing in with an assigned Okta user account.

Troubleshooting: Common issues:
  • "User not assigned" - Add the user to the application in Okta
  • "Invalid redirect_uri" - Verify the redirect URI matches exactly
  • "Invalid client" - Double-check your Client ID and Secret

Okta Endpoint Reference

For reference, here are the standard Okta OIDC endpoints:

Authorization URL: https://yourcompany.okta.com/oauth2/v1/authorize
Token URL:         https://yourcompany.okta.com/oauth2/v1/token
UserInfo URL:      https://yourcompany.okta.com/oauth2/v1/userinfo
Issuer:            https://yourcompany.okta.com

Next Steps

  • Return to SSO Settings
  • Configure MFA policies in Okta for additional security
  • Set up automatic user provisioning (SCIM) - Enterprise feature

Was this article helpful?

Still need help? Contact support

Search across meetings, recordings, and participants
Press ESC to close