SSO offers a user-friendly approach to log into multiple applications or platforms using a single set of credentials. This document outlines our company's guidelines for SSO integration with Open Id Connect (OIDC).
Pre-requisites
To enable this feature, you must have a teams account and hold the owner role. Once enabled, All members will be able to log in using your identity provider.
Supported Features
The following features are supported:
SP-initiated SSO
Just-In-Time provisioning
For more information on the listed features, visit the Okta Glossary
Configure OpenID
Login to your Okta Admin Dashboard.
Navigate to Applications. Choose Applications from the dropdown then click on Browse App Catalog.
Search for "Wave Connect" in the app catalog and select Wave Connect application.
Press the "Add Integration" button and then "Done."
Click the Sign On tab, and then copy the Client ID and Client secret values.
Sign in to your Wave Connect account and navigate to your Organization tab.
From your organization tab, go to Settings and then Security.
Click on Configure OIDC
Paste the values for Client Id and Client Secret from Okta in their respective fields.
Enter your organization's tenet URL on Okta under Issuer on Wave Connect (e.g. https://your-organization.okta.com) and press "Save."
Testing
Once saved, your setup has been completed and the integration is ready to use. You can test your login process either by:
Going to your Wave Connect login domain from you browser e.g. app.wavecnct.com/login
Initiating login from within your Okta console