All Products
Search
Document Center

Identity as a Service:Connect to Okta

Last Updated:Mar 31, 2026

Configure Okta as an external identity provider (IdP) for IDaaS Employee Identity and Access Management (EIAM) over OpenID Connect (OIDC), so employees can log in to the IDaaS EIAM portal using their existing Okta accounts.

The setup follows a three-step exchange: retrieve a redirect URI from IDaaS, create an OIDC app integration in Okta, then copy the client credentials back into IDaaS. After configuration is complete, employees click the Okta button on the IDaaS EIAM login page and authenticate through Okta.

Prerequisites

Before you begin, ensure that you have:

Considerations

Review the following before you start:

  • Proof Key for Code Exchange (PKCE): PKCE adds an extra layer of security to the OIDC flow. Okta's PKCE implementation supports only Secure Hash Algorithm 256 (SHA-256) for the code challenge. Enable PKCE based on your business requirements.

  • Dynamic issuer mode: If you use a self-managed Okta authorization server instead of the default Okta org authorization server, you must configure Dynamic mode for the issuer and add access policies to the Okta app. See step 3 for details.

  • Controlled access: During Okta app setup, the Controlled access setting determines which Okta users can authenticate. If you select a restricted option, grant access to the relevant users or groups before testing the login flow.

Step 1: IDaaS — Start the binding process

  1. Go to the details page of your IDaaS EIAM instance. In the left-side navigation pane, click IdPs.

  2. On the IdPs page, click Other IdPs. In the Add IdP panel, click OIDC IdP.

    image.png

  3. In the Bind OIDC Identity Provider panel, enter a display name in the Nickname field and select an authentication mode. To enable PKCE, select the corresponding option — note the SHA-256-only constraint above.

    image.png

  4. In the lower part of the panel, copy the value of IDaaS Redirect URI. You will paste this into Okta in the next step.

    image.png

Step 2: Okta — Create an app integration

  1. Log in to the Okta Admin Console.

  2. Go to Applications and click Create App Integration.

  3. Set Sign-in method to OIDC - OpenID Connect and Application type to Web Application.

  4. Enter a name in the App integration name field.

  5. Paste the IDaaS Redirect URI you copied in step 1 into the Sign-in redirect URIs field.

  6. Configure Controlled access. For testing, or when you do not need to restrict access, select Allow everyone in your organization to access. Otherwise, grant access to the appropriate users or groups.

  7. Click Save. The app integration details page opens.

Step 3: IDaaS — Configure the OIDC IdP

Go back to the Bind OIDC Identity Provider panel in the IDaaS console and fill in the following fields using values from the Okta app integration details page.

Client ID

On the General tab in Okta, click the copy icon next to Client ID and paste the value into the Client ID field in IDaaS. If you enabled PKCE in step 1, also select Require PKCE as additional verification.

image.png

Client Secret

On the General tab, click the copy icon next to Client Secret and paste the value into the Client Secret field in IDaaS.

image.png

Issuer

On the Sign On tab, click Edit in the OpenID Connect ID Token section. Set Issuer to Okta URL, copy the URL, and paste it into the Issuer field in IDaaS.

image.png
Note

If you use a self-managed authorization server (Dynamic mode), go to Security > API in the Okta Admin Console, open the Authorization Servers tab, and copy the issuer URI from there instead. Also add access policies to the Okta app before proceeding.

After entering the issuer URL, click Parse next to the Issuer field. The endpoints are automatically populated.

image.png

Click Next to go to the Select Scenario step. For details on scenario configuration, see Select a scenario.

Log in to IDaaS EIAM with Okta

After configuration is complete, employees can log in to the IDaaS EIAM portal through Okta.

  1. On the IDaaS EIAM login page, click the Okta button.

    image.png

  2. IDaaS sends an authentication request to Okta. If no Okta session is active, the Okta login page appears. Authenticate with your Okta credentials. If an Okta session is already active, you are redirected to IDaaS EIAM.

    image.png

  3. After Okta authenticates the user, one of the following occurs based on how accounts are configured:

    SituationResult
    The Okta account is already bound to an IDaaS EIAM accountThe user is logged in directly
    No binding existsIDaaS automatically binds the Okta account to the matching IDaaS account
    Automatic binding failsThe user must manually bind the accounts or trigger automatic account creation

    For details on account binding behavior and scenario configuration, see Select a scenario.