Okta (OIDC) Setup
Step-by-step guide to configure Single Sign-On with Okta using OpenID Connect.
Prerequisites
- Okta admin account
- SecureCodingHub org admin account
Step 1 — Create an Okta Application
Go to Okta Admin Console → Applications → Create App Integration
Sign-in method: OIDC
Application type: Web Application
App name: SecureCodingHub
Sign-in redirect URI: https://api.securecodinghub.com/api/sch/auth/sso/callback/oidc
Assignments: Assign to your users/groups
Step 2 — Copy Credentials
Collect the following values from your Okta application:
| Setting | Where to Find |
|---|---|
| Client ID | General → Client Credentials |
| Client Secret | General → Client Credentials |
| Okta Domain | Your Okta URL (e.g. dev-12345.okta.com) |
| Discovery URL | https://{okta-domain}/.well-known/openid-configuration |
Step 3 — Configure SSO in SecureCodingHub
Log in as Org Admin → SSO Settings
Protocol: OIDC
Entity ID / Client ID: paste your Okta Client ID
Discovery / Metadata URL: paste your Okta OpenID configuration URL
Client Secret: paste the secret
Enable SSO
Click Save
Step 4 — Test
Open an incognito/private browser window
Go to SecureCodingHub login
Enter an email address with your organization's domain
You should be redirected to Okta login
After authentication, you should be logged into SecureCodingHub