OKTA SSO Configuration Guide (OIDC)
Connect your existing OKTA account
Prerequisites
You must have admin access to your Okta organisation.
You need a gospace account with admin privileges, to have verified the Okta domain in admin settings.
Configuration steps
Sign in to your Okta Admin Console.
Navigate to "Applications" > "Applications".
Click "Create App Integration".
Select "OIDC - OpenID Connect" as the Sign-in method, and "Web Application" as the Application type.
Click "Next".
Fill in the following details:
App integration name: "gospace"
Sign-in redirect URIs: https://app.gospace.app/auth/login
Sign-out redirect URIs: https://app.gospace.app/
Controlled access: Select "Allow everyone in your organisation to access"
Click "Save".
Navigate to the "Sign On" tab and scroll down to the "OpenID Connect ID Token" section.
Ensure that "Include in ID Token" is selected for both "Groups claim type" and "Group claims filter".
Set "Groups claim type" to "Filter".
In "Group claims filter", enter the Okta group that contains your gospace users.
Click "Save".
Return to your Okta Admin Console and assign the gospace application to the appropriate users or groups.
SP-initiated SSO
To initiate SSO from gospace:
Navigate to https://app.gospace.app/auth/login/.
Click "Continue with Okta".
You will be redirected to the Okta sign-in page.
Enter your Okta credentials.
After successful authentication, you will be redirected back to gospace.
Troubleshooting
Ensure that the Redirect URI in both Okta and gospace configurations match exactly.
Check that users are correctly assigned to the gospace application in Okta.
If you encounter any issues, please contact gospace support
For more information on Okta's OpenID Connect implementation, please refer to the Okta Developer Documentation here.
Last updated