Okta Workforce
Overview
You can integrate Observo with your Okta Workforce to enable Single Sign-On (SSO). The initial step involves setting up an OIDC app integration in Okta using the information provided on the Observo SSO page. Following this, you'll need to gather the Client ID and Secret of that application, utilizing them to configure SSO within Observo. Further details on these procedures are elaborated in the subsequent sections of the document.
Register OKTA OIDC app integration
To enable users to sign in using Okta Workforce, it is necessary to register your application as OIDC app integration within Okta Admin Console. To understand the process of registering a new app integration with Google, refer to Create OIDC app integrations on Okta Help Center. documentation. Throughout this procedure, Okta will automatically generate a Client ID and Client Secret for your application; ensure to take note of these details. When configuring your app, make sure to utilize these settings:
On the Sign-in method, select OIDC.
Choose "Web application" as the Application type and configure the following parameters:
Trusted Origins:https://{ObservoAuthDomain}Sign-in Redirect URIs:https://{ObservoAuthDomain}/login/callback
Observo Auth Domain can be found in SSO page of Observo UI.
Create Okta Workforce Connection
Next, Proceed to create and set up an Okta Workforce Connection in Observo by navigating to Settings > SSO > Create SSO. Ensure that you have the Client ID and Client Secret, which were generated during the setup of your application in the Okta Admin Console. Use your Okta Workforce domain as Domain field and your orgs domain as Domain Aliases.
Last updated
Was this helpful?

