Ejento AI
GuidesQuickstartRecipesREST APIsRelease NotesFAQs
GuidesQuickstartRecipesREST APIsRelease NotesFAQs
Ejento AI
  1. Setup After Deployment
  • How to Setup Ejento on Azure
  • Prerequisites
  • Deployment on Azure
  • Setup After Deployment
    • Custom Domain Set Up
    • Microsoft SSO Authentication
    • Okta SSO Authentication
    • SharePoint Connection Set Up
    • Developer API Set Up
  • Overview
    • Azure Resources
  1. Setup After Deployment

Okta SSO Authentication

Welcome to the guide on registering your application for Okta Single Sign-On (SSO) authentication with Ejento AI. This guide will walk you through the necessary steps to configure your application and integrate it with Okta's identity platform for secure and streamlined authentication.
💡 Note: The following steps are to be completed after deployment is initiated — please finish the deployment process before proceeding.

Follow the steps below to register your app for Okta SSO Authentication using OpenID Connect (OIDC):

Creating Okta App Registration#

Head over to: Okta Admin Console#
1. Log in to your Okta account and navigate to the Applications tab in the admin console.#
Step 1 screenshot
2. Click on Create App Integration#
Step 2 screenshot
3. In the dialog, select OIDC - OpenID Connect as the Sign-in method#
Step 3 screenshot
4. select Web Application as the Application type, then click Next.#
Step 4 screenshot
5. Type Ejento AI as the App Integration Name#
Step 5 screenshot
6. Check the following next to Grant Type#
Step 6 screenshot
7. Click on Add URI next to Sign-in redirect URIs#
Step 7 screenshot
8. Type "https://app-7ubqshdf.azurewebsites.net/accounts/okta/login/callback" as the Sign-in redirect URI#
Step 8 screenshot
9. Next to Controlled access, select Skip group assignments for now and Click on Save#
Step 9 screenshot
10. After saving you would have the following interface, click on Edit#
Step 10 screenshot

Verifying Configuration Details#

1. Check Require PKCE as additional verification#
Step 11 screenshot
2. The client ID and client secret will be required by us#
Step 12 screenshot
3. Click on Edit next to the General Settings#
Step 13 screenshot
4. Verify Grant type#
Step 14 screenshot
5. Verify the User Consent is checked and Sign-in redirect URI is there#
Step 15 screenshot
6. From the dropdown next to Login initiated by, select Either Okta or App#
Step 16 screenshot
7. Check Display application icon to users#
Step 17 screenshot
8. Type "https://app-7ubqshdf.azurewebsites.net/accounts/okta/login/?next=/" as the Initiate login URI#
Step 18 screenshot
9. Click on Save#
Step 19 screenshot
10. Go to Okta API Scopes Tab#
Step 20 screenshot
11. From the list of Scopes, Grant consent for the following ones#
Step 21 screenshot
We will need:
Client ID and Client Secret from Step#12.
Your Okta Organization Base URL.
NOTE
THIS WOULD BE PRESENT IN THE URL OF YOUR OKTA ORGANIZATION. SOMETHING LIKE dev-74465113.okta.com.
Previous
Microsoft SSO Authentication
Next
SharePoint Connection Set Up