FundApps SSO Connection - Okta

Okta Application Registration (Prerequisite)

  1. Create an Okta OIDC Application

    To connect your Okta tenant as an identity Provider in Auth0, you must create an OIDC application. In your Okta Admin Dashboard, create a new application.

    Select Applications > Applications, and Create App Integrationimage

  2. Select Create New App.image
  3. Choose OIDC as the Sign-in method. Choose Web Application as your Application Type.
  4. Select Next.
  5. Enter your App integration name.
  6. Add your FundApps tenant information callback URL in the Sign-in redirect URIs field.
    • Sign-in redirect URI:
    • Sign-out redirect URI: https://auth.fundapps.coUntitled

Create SSO Connection in FundApps platform (Required)

  1. From the OKTA Application you created in the previous step, find your Client ID(2) and Client Secret(3) fields. You will use these in the FundApps SSO Admin Portal to configure your Okta Connection.Untitled
  2. Get your OKTA domain from your main OKTA Dashboard. It should be something like<your-organisation>
  3. Log in to your FundApps platform and navigate to the SSO configuration page: https://<your environment>
  4. Click on Add Configuration > OKTA
  5. Fill in the fields with the information collected earlier.
  6. Click Create to set up the SSO connection
  7. Test your newly created SSO connection by clicking on the Try button
  8. If the connection is set up correctly, you should see this screen.

Configure IdP-Initiated Sign-On (Optional)

  1. Click the blue Settings button to the right of the connection name you wish to edit.
  2. Navigate to the SSO page for your tenant i.e. {tenantName}
  3. Once in the edit modal, make a note of the value in the IdP-Initiated Login URL field.Untitled (1).png
  4. Log into your Okta dashboard and click on the FundApps app you configured previously - found under Applications.                                                                  Untitled (2).png
  5. Change Login initiated by to be Either Okta or App.
  6. Paste the Idp-Initiated URL from Step 3 into the Initiate Login URI field.Untitled (3).png

Idp-Initiated Sign-On is now configured for your connection.

Was this article helpful?
0 out of 0 found this helpful
Share article