Ejento AI Register App for Okta SSO Authentication
Welcome to the guide on registering your application for Okta Single Sign-On (SSO) authentication with Ejento AI. This guide will walk you through the necessary steps to configure your application and integrate it with Okta's identity platform for secure and streamlined authentication.
Follow the steps below to register your app for Okta SSO Authentication using OpenID Connect (OIDC):
Creating Okta App Registration
Head over to: Okta Admin Console
1. Log in to your Okta account and navigate to the Applications tab in the admin console.
2. Click on Create App Integration
3. In the dialog, select OIDC - OpenID Connect as the Sign-in method
4. select Web Application as the Application type, then click Next.
5. Type Ejento AI as the App Integration Name
6. Check the following next to Grant Type
7. Click on Add URI next to Sign-in redirect URIs
8. Type "https://app-7ubqshdf.azurewebsites.net/accounts/okta/login/callback" as the Sign-in redirect URI
9. Next to Controlled access, select Skip group assignments for now and Click on Save
10. After saving you would have the following interface, click on Edit
Verifying Configuration Details
1. Check Require PKCE as additional verification
2. The client ID and client secret will be required by us
3. Click on Edit next to the General Settings
4. Verify Grant type
5. Verify the User Consent is checked and Sign-in redirect URI is there
6. From the dropdown next to Login initiated by, select Either Okta or App
7. Check Display application icon to users
8. Type "https://app-7ubqshdf.azurewebsites.net/accounts/okta/login/?next=/" as the Initiate login URI
9. Click on Save
10. Go to Okta API Scopes Tab
11. From the list of Scopes, Grant consent for the following ones
We will need:
- Client ID and Client Secret from Step#12.
- Your Okta Organization Base URL.
This would be present in the URL of your Okta organization. Something like dev-74465113.okta.com.