External IdP Configuration - Okta OIDC

External IdP Configuration - Okta OIDC

 

Create a new app integration.

  • Go to Applications and click Create App Integration.
  • On the Create a new app integration page:
  • Select Sign-in method - OIDC - OpenID Connect
  • Select Application Type - Web Application
  • Click Next
  • Enter the App Integration name as OpenMethods-OIDC
  • Grant Type 
  • Select Authorization code, Refresh Token and Implicit
  • Sign-in redirect URIs 
  • Sign-out redirect URIs
  • Assignments
  • Control Access
  • Select Skip group assignment for now
  • Click Save.

Create App Integration

Create App Integration

 

PKCE Verification

  • Select the Application and click General
  • Click Edit under Client Credentials
  • Select Require PKCE as additional verification
  • Click the Save button.

 

Copy the required values.

  • Select the Application 
  • Click the General tab
  • Copy the Client ID
  • Copy the Secret.

  • Replace <Base URL> in the following URLs, and both URLs will be used in the OpenMethods Experience Designer Provider configuration .
  • Authorize Endpoint: https://<Base URL>/oauth2/v1/authorize
  • Token Endpoint: https://<Base URL>/oauth2/v1/token
  • Base URLs can be obtained by clicking the arrow in the top right section and copying the URL as highlighted in the image.

Assignments

  • Create a new Group
  • Click Directory and Groups, and then click the Add Group button.
  • Enter the name OpenMethods-Users.

 

  • Assign people to the Group.
  • Click the group name OpenMethods-Users from the Group's list
  • Click the Assign People button
  • Click the + sign to select the people from the list, by clicking the + sign, who should be added to the Group.

 

  • Assign the Group
  • Goto Applications and Select the Application name 
  • Click Assignments
  • Select Group from the Assign dropdown
  • Click Assign to Groups
  • Click Assign next to the OpenMethods-Users Group
  • Click the Done button.

 


    • Related Articles

    • External IdP Configuration - ADFS OIDC

      OpenMethods allows users to log in with a single sign-on (SSO) system using SAML 2.0. An identity provider (IDP) that supports SAML 2.0 can be set up in various ways, such as a self-hosted Active Directory Federation Services (ADFS) server. ADFS is a ...
    • External IdP Configuration - PingOne OIDC

      Add Application Application → Click + sign. Enter Application Name - The suggested Name is OpenMethods-SSO-OIDC Enter Description. Click Application Type OIDC Web App Click the Save button. Edit configuration Select Response Type Code, Token, and ID ...
    • External IdP Configuration - Azure AD OIDC/SAML2

      Add Application Click the App Registration located under the Azure Services. Click New Registration Enter Name - The suggested name is OpenMethods-SSO Select the appropriate account types. Redirect URI Select Web Enter ...
    • External IdP Configuration - Okta SAML2

      Create a new app integration Click Applications on the left side of the navigation section. Click Applications Click Create App Integration On the Create a new app integration page Select Sign-in method SAML 2.0 Click Next button Enter the App name ...
    • External IdP Configuration - PingOne SAML2

      Add Application Click Applications from the left-side navigation section Click Applications + sign. Enter Application Name - The suggested Name is OpenMethods-SSO-OIDC Enter Description. Click Application Type SAML Application Click the Configure ...