Okta OpenID Connect Single Sign-on (SSO)

Max-Antoine
Max-Antoine
  • Updated

SSO offers a user-friendly approach to log into multiple applications or platforms using a single set of credentials. This document outlines our company's guidelines for SSO integration with Open Id Connect (OIDC).

Pre-requisites

To enable this feature, you must have a teams account and hold the owner role. Once enabled, All members will be able to log in using your identity provider.

 

Supported Features

The following features are supported:

  • SP-initiated SSO
  • Just-In-Time provisioning
  • For more information on the listed features, visit the Okta Glossary

 

  1. Login to your Okta Admin Dashboard.

  2. Navigate to Applications. Choose Applications from the dropdown then click on Browse App Catalog.

    browse-app-catalog.png
  3. Search for "Wave Connect" in the app catalog and select Wave Connect application.

    wave-app-saml-okta.png

  4. Press the "Add Integration" button and then "Done."

    add-integration.png

  5. Click the Sign On tab, and then copy the Client ID and Client secret values.

    client-id-client-secret.png

  6. Sign in to your Wave Connect account and navigate to your Organization tab.

    organization-tab.png

  7. From your organization tab, go to Settings and then Security.

    security-tab.png

  8. Click on Configure OIDC

  9. Paste the values for Client Id and Client Secret from Okta in their respective fields.

    paste-client-id-secret.png

  10. Enter your organization's tenet URL on Okta under Issuer on Wave Connect (e.g. https://your-organization.okta.com) and press "Save."

    paste-issuer.png


Testing

Once saved, your setup has been completed and the integration is ready to use. You can test your login process either by:

  1. Going to your Wave Connect login domain from you browser e.g. app.wavecnct.com/login
  2. Initiating login from within your Okta console