Docs/SSO Configuration/Okta (OIDC)

Okta (OIDC) Setup

Step-by-step guide to configure Single Sign-On with Okta using OpenID Connect.

Prerequisites

  • Okta admin account
  • SecureCodingHub org admin account

Step 1 — Create an Okta Application

1

Go to Okta Admin ConsoleApplicationsCreate App Integration

2

Sign-in method: OIDC

3

Application type: Web Application

4

App name: SecureCodingHub

5

Sign-in redirect URI: https://api.securecodinghub.com/api/sch/auth/sso/callback/oidc

6

Assignments: Assign to your users/groups

Step 2 — Copy Credentials

Collect the following values from your Okta application:

SettingWhere to Find
Client IDGeneral → Client Credentials
Client SecretGeneral → Client Credentials
Okta DomainYour Okta URL (e.g. dev-12345.okta.com)
Discovery URLhttps://{okta-domain}/.well-known/openid-configuration

Step 3 — Configure SSO in SecureCodingHub

1

Log in as Org Admin → SSO Settings

2

Protocol: OIDC

3

Entity ID / Client ID: paste your Okta Client ID

4

Discovery / Metadata URL: paste your Okta OpenID configuration URL

5

Client Secret: paste the secret

6

Enable SSO

7

Click Save

app.securecodinghub.com/admin/sso
SSO Configuration
OIDC
0oa1b2c3d4e5f6g7h8i9
https://dev-12345.okta.com/.well-known/openid-configuration
••••••••••••••••
Save

Step 4 — Test

1

Open an incognito/private browser window

2

Go to SecureCodingHub login

3

Enter an email address with your organization's domain

4

You should be redirected to Okta login

5

After authentication, you should be logged into SecureCodingHub

Tip: If you use Okta groups, you can assign the SecureCodingHub app to a group so all members get access automatically. Combined with JIT provisioning, new group members are created in SecureCodingHub on first login.