This document will guide you through the process of configuring Okta as an OpenID Connect (OIDC) Identity Provider (IdP) for Coginiti Team
- Admin access to your Okta Account.
- Admin access to your Coginiti Team
Log into your Okta account
Log into your Okta account as an admin. Your Okta account link should resemble:
Create a new Okta application
Navigate to Applications -> Add Application. Choose the following settings:
- Sign-in method: OIDC - OpenID Connect
- Application type: Web Application
- App integration name:
Click on "Next" to proceed.
Configure Okta application settings
On the "Application settings" page:
- Set Grant type to: Client Credentials
- Sign-in redirect URIs:
- Sign-out redirect URIs:
Click "Done" to finish the application setup.
Retrieve Client Id and Secret
Navigate to the newly created application's "General" tab, and note the "Client Id" and "Secret".
Add users in Okta and assign them to the app. Ensure these users have the same email addresses as in Coginiti Team.
Set up Okta as IdP in Coginiti
Log into Coginiti Team as an admin and navigate to the IdP configuration section. Fill in the form with the following details:
- IdP provider: Okta
- Login URL:
- Client Id: The Client Id obtained from Okta
- Secret: The Secret obtained from Okta
- Coginiti host:
profile email openid
- Exchange code URL:
- User information URL:
Click "Save" to finalize the IdP configuration.
Never expose your Okta secret and private keys in your client-side code or push them to a public repository. Always keep them safe on your server.
This guide provides steps to set up Okta as an IdP for Coginiti Team. Be sure to replace placeholders with your actual details. For more information, please refer to Okta's and Coginiti's official documentation.
For more in-depth information, please refer to the official Okta documentation