Ejento AI
HomeQuickstartGuidesRecipesREST APIsChangelogFAQs
HomeQuickstartGuidesRecipesREST APIsChangelogFAQs
Ejento AI
  1. Quickstart
  • Quickstart
  • Ejento AI Register App for Microsoft SSO Authentication
  • Ejento AI Register App for Okta SSO Authentication
  • Ejento AI Deployment
    • Pre-Requisites for Ejento AI Deployment
    • Ejento AI Depolyment
    • Pricing
  1. Quickstart

Ejento AI Register App for Okta SSO Authentication

Welcome to the guide on registering your application for Okta Single Sign-On (SSO) authentication with Ejento AI. This guide will walk you through the necessary steps to configure your application and integrate it with Okta's identity platform for secure and streamlined authentication.

Follow the steps below to register your app for Okta SSO Authentication using OpenID Connect (OIDC):

Creating Okta App Registration#

Head over to: Okta Admin Console#
1. Log in to your Okta account and navigate to the Applications tab in the admin console.#
Step 1 screenshot
2. Click on Create App Integration#
Step 2 screenshot
3. In the dialog, select OIDC - OpenID Connect as the Sign-in method#
Step 3 screenshot
4. select Web Application as the Application type, then click Next.#
Step 4 screenshot
5. Type Ejento AI as the App Integration Name#
Step 5 screenshot
6. Check the following next to Grant Type#
Step 6 screenshot
7. Click on Add URI next to Sign-in redirect URIs#
Step 7 screenshot
8. Type "https://app-7ubqshdf.azurewebsites.net/accounts/okta/login/callback" as the Sign-in redirect URI#
Step 8 screenshot
9. Next to Controlled access, select Skip group assignments for now and Click on Save#
Step 9 screenshot
10. After saving you would have the following interface, click on Edit#
Step 10 screenshot

Verifying Configuration Details#

1. Check Require PKCE as additional verification#
Step 11 screenshot
2. The client ID and client secret will be required by us#
Step 12 screenshot
3. Click on Edit next to the General Settings#
Step 13 screenshot
4. Verify Grant type#
Step 14 screenshot
5. Verify the User Consent is checked and Sign-in redirect URI is there#
Step 15 screenshot
6. From the dropdown next to Login initiated by, select Either Okta or App#
Step 16 screenshot
7. Check Display application icon to users#
Step 17 screenshot
8. Type "https://app-7ubqshdf.azurewebsites.net/accounts/okta/login/?next=/" as the Initiate login URI#
Step 18 screenshot
9. Click on Save#
Step 19 screenshot
10. Go to Okta API Scopes Tab#
Step 20 screenshot
11. From the list of Scopes, Grant consent for the following ones#
Step 21 screenshot
We will need:
Client ID and Client Secret from Step#12.
Your Okta Organization Base URL.
NOTE
THIS WOULD BE PRESENT IN THE URL OF YOUR OKTA ORGANIZATION. SOMETHING LIKE dev-74465113.okta.com.
Previous
Ejento AI Register App for Microsoft SSO Authentication
Next
Pre-Requisites for Ejento AI Deployment