How to сonfigure SSO with Okta

  1. Create a New Application Integration
    • Log in to your Okta Admin Console

    • Navigate to Application > Applications

    • Click Create a new app integration

    • Select the OIDC - OpenID Connect sign-in method

    • Select Web Application as the application type

    • Click Next
      1_Creating a new app integration
  2. Set the Application Name

    • Enter a name for the application. The name does not affect functionality, so you can use a descriptive name.
      2_New integration1

  3. Configure Sign-In and Sign-Out Redirect URIs

    • Sign-In Redirect URIs

      • Enter the URL provided by Constructor.

    • Sign-Out Redirect URIs

      • Add the production domain: https://your-production-domain.com.

    Configure Sign-In and Sign-Out Redirect URIs

  4. Configure Application Assignments

    • Navigate to the Assignments section.

    • Assign users or groups who can log in via this application. The recommended setting is Everyone to allow all users to access.

    • Click Save2_New integration4

      Note: Assignments can also be configured or updated later as needed.

  5. Provide Client ID and Client Secret

    • Once the application is created, retrieve the following:

      • Client ID

      • Client Secret: The first secret is generated automatically and can be used for our purposes.

    • Create a support ticket to securely share these credentials with Constructor.

    3_General settings

Note

  • The application configured using this method has no permissions for the Okta API and is solely used for authentication. By default, authenticated users cannot access or interact with the Okta API unless additional configuration is performed.

  • Okta acquired Auth0 provider and there are two concurrent implementations:

    • Customer Identity Cloud (formerly Auth0)
    • Workforce Identity Cloud (Okta itself)
  • This instruction focuses on configuring the Workforce Identity Cloud.