Configure OpenID Connect with Okta

Prev Next

Overview

This guide will walk you through configuring OpenID Connect authentication with Okta for Discngine Admin Center. Once completed, users will be able to log in using their Okta credentials.

Prerequisites

Before configuring Okta OpenID Connect, ensure you have:

  • Organisation Administrator access to Discngine Admin Center (if you see an "Identity Provider" section, you are an Administrator)
  • Administrator access to an Okta Workforce Identity Cloud Account
  • Your Okta account connected to a business email address

Okta Configuration

Step 1: Access Okta Admin Panel

  1. Log in to your Okta account
  2. Navigate to the Admin panel

Okta admin button

Step 2: Create App Integration

  1. Navigate to ApplicationsApplications
  2. Click the Create App Integration button

Create app integration

Step 3: Select Integration Type

  1. Select OIDC - OpenID Connect as the sign-in method
  2. Select Web Application as the application type
  3. Click Next

OIDC and web application

Step 4: Configure Application Settings

  1. Enter an App integration name (e.g., "Discngine Admin Center")
  2. Ensure Authorization Code is checked under Grant type
  3. Set the Sign-in redirect URI to: https://account.discngine.cloud/oauth2/callback
  4. Under Assignments, select Skip group assignment for now
  5. Click Save

Name and redirect URI

Step 5: Save Client Credentials

Once the application is created, copy the following values to a secure location:

  • Client ID
  • Client Secret (click to reveal)

Client ID and secret

Step 6: Configure Issuer URL

  1. Navigate to the Sign On tab
  2. Under OpenID Connect ID Token, change the Issuer to use the Okta URL
  3. Click Save
  4. Copy the Issuer URL (e.g., https://your-domain.okta.com)

Issuer URL

Step 7: Assign Users

  1. Navigate to DirectoryPeople
  2. Click on the username of the user you want to enable for authentication
  3. Click Assign Applications
  4. Click Assign next to your newly created application
  5. Click Save and Go Back, then Done

Configure OpenID Connect in Discngine Admin Center

Step 1: Access Identity Providers

  1. Log in to Discngine Admin Center as an Organization Administrator
  2. Navigate to SettingsIdentity Providers
  3. Click Add Provider and select OpenID Connect

Create a new OpenID integration

Step 2: Configure Provider Settings

Fill in the following fields:

Basic Settings:

  • Name: Okta
  • Client ID: Enter the Client ID from Okta
  • Client Authentication Method: Select HTTP Basic authentication (client_secret_basic)
  • Client Secret: Enter the Client Secret from Okta

Discovery Settings:

  • Discover Endpoints: Enable this option
  • Issuer URL: Enter your Okta URL (e.g., https://your-domain.okta.com)

Scopes:

  • Scope: openid email

Linking Strategy:

  • Select Link on email. Create the user if they do not exist

Button Customization:

  • Button Text: Login with Okta (or customize as needed)
  • Button Icon: Optionally add a URL to an Okta icon

Okta Identity Provider Configuration

Step 3: Enable for Applications

  1. Scroll down to the Applications section
  2. Enable the identity provider for your desired applications
  3. Toggle Create Registration to automatically register users
  4. Click Save

Testing the Configuration

Step 1: Access Login Page

Navigate to https://admin-<organization-name>.discngine.cloud/

Step 2: Test Login

  1. Enter your email address
  2. You should see the Login with Okta button
  3. Click the button
  4. You will be redirected to the Okta login page
  5. Enter your Okta credentials
  6. Complete any required multi-factor authentication
  7. After successful authentication, you'll be redirected back to Discngine Admin Center

Login with Okta

Troubleshooting

Common Issues

Redirect URI Mismatch

  • Ensure the redirect URI in Okta exactly matches: https://account.discngine.cloud/oauth2/callback

User Not Assigned

  • Verify that the user attempting to log in is assigned to the Okta application
  • Check the Assignments section in your Okta application

Invalid Client Credentials

  • Double-check that you copied the Client ID and Client Secret correctly
  • Ensure the Client Secret hasn't been regenerated

Issuer URL Issues

  • Verify you're using the correct Okta domain URL
  • Ensure the URL doesn't have a trailing slash

Scope Errors

  • Make sure openid and email scopes are configured
  • Verify that the scopes are enabled in your Okta application

Additional Resources

Next Steps