Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Opsera supports Okta to Okta account federation via Okta OpenID Connection (OIDC). In this process, both Organizations must use Okta for their user identify management. The customer will be responsible for configuring an External Identify Provider in their Okta account and share that with Opsera. Once complete all authentication will be managed through the customer’s Okta via Federated Identity.

...

Values Required for Customer to setup their SSO

...

Ensure users have access TO the app in your SSO

Please ensure BOTH sign-in redirect URI’s are included in this setup, otherwise it will fail.

What you must send Opsera (after you complete your setup):

...

  1. Configure the new APP with these values:

    1. Client acting on behalf of user: Authorization Code

    2. Sign-in redirect URI’s:

    3. Sign-out redirect URI’s:

    4. Base URI’s:

    5. Assignments*: Controlled access: Up to you to choose as the SSO Admin but users MUST have this access in order to log in.

Please ensure BOTH sign-in redirect URI’s are included in this setup, otherwise it will fail.

Note

*Assignments: You must ensure users are granted access to the new Application created in Okta if you want them to be able to log into Opsera.

...