Configuring Coginiti Team for Okta OAuth

Introduction

This document will guide you through the process of configuring Okta as an OpenID Connect (OIDC) Identity Provider (IdP) for Coginiti Team

Prerequisites

  • Admin access to your Okta Account.
  • Admin access to your Coginiti Team

Okta Configuration

  1. Log into your Okta account

    Log into your Okta account as an admin. Your Okta account link should resemble: https://{unique-id}-admin.okta.com/

  2. Create a new Okta application

    Navigate to Applications -> Add Application. Choose the following settings:

    • Sign-in method: OIDC - OpenID Connect
    • Application type: Web Application
    • App integration name: {Coginiti Team}

    Click on "Next" to proceed.

  3. Configure Okta application settings

    On the "Application settings" page:

    • Set Grant type to: Client Credentials
    • Sign-in redirect URIs: {https://coginiti-hostname}:443/api/auth/authorization-code/callback
    • Sign-out redirect URIs: {https://coginiti-hostname}:443

    Click "Done" to finish the application setup.

  4. Retrieve Client Id and Secret

    Navigate to the newly created application's "General" tab, and note the "Client Id" and "Secret".

  5. Assign Users

    Add users in Okta and assign them to the app. Ensure these users have the same email addresses as in Coginiti Team.

Coginiti Configuration

  1. Set up Okta as IdP in Coginiti

    Log into Coginiti Team as an admin and navigate to the IdP configuration section. Fill in the form with the following details:

    • IdP provider: Okta
    • Login URL: https://{unique-id}.okta.com/oauth2/default/v1/authorize
    • Client Id: The Client Id obtained from Okta
    • Secret: The Secret obtained from Okta
    • Coginiti host: {https://coginiti-hostname}:443
    • Scopes: profile email openid
    • Exchange code URL: https://{unique-id}.okta.com/oauth2/default/v1/token
    • User information URL: https://{unique-id}.okta.com/oauth2/default/v1/userinfo

Click "Save" to finalize the IdP configuration.

Security Note

Never expose your Okta secret and private keys in your client-side code or push them to a public repository. Always keep them safe on your server.

Conclusion

This guide provides steps to set up Okta as an IdP for Coginiti Team. Be sure to replace placeholders with your actual details. For more information, please refer to Okta's and Coginiti's official documentation.

Further Reading

For more in-depth information, please refer to the official Okta documentation

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request