SSO offers a user-friendly approach to log into multiple applications or platforms using a single set of credentials. This document outlines our company's guidelines for SSO integration with Open Id Connect (OIDC).
Pre-requisites
To enable this feature, you must have a teams account and hold the owner role. Once enabled, All members will be able to log in using your identity provider.
Supported Features
The following features are supported:
- SP-initiated SSO
- Just-In-Time provisioning
- For more information on the listed features, visit the Okta Glossary
Configure OpenID
- Login to your Okta Admin Dashboard.
-
Navigate to Applications. Choose Applications from the dropdown then click on Browse App Catalog.
-
Search for "Wave Connect" in the app catalog and select Wave Connect application.
-
Press the "Add Integration" button and then "Done."
-
Click the Sign On tab, and then copy the Client ID and Client secret values.
- Sign in to your Wave Connect account and navigate to your Organization tab.
-
From your organization tab, go to Settings and then Security.
- Click on Configure OIDC
- Paste the values for Client Id and Client Secret from Okta in their respective fields.
- Enter your organization's tenet URL on Okta under Issuer on Wave Connect (e.g. https://your-organization.okta.com) and press "Save."
Testing
Once saved, your setup has been completed and the integration is ready to use. You can test your login process either by:
- Going to your Wave Connect login domain from you browser e.g. app.wavecnct.com/login
- Initiating login from within your Okta console