- 13 Aug 2024
- 2 Minutes to read
- Print
- DarkLight
- PDF
Okta OIDC
- Updated on 13 Aug 2024
- 2 Minutes to read
- Print
- DarkLight
- PDF
Step by step guide to configure Okta as an OIDC Identity Provider within Visma
Follow the steps below to configure Okta as an OIDC Identity Provider within Visma. Keep Authentication Settings open in your browser while you access Okta in a new window or tab. You will need to return to the Single Sign-On page to complete the configuration steps.
Prerequisites
Okta account
All of your users under your account in Visma will need a pre-existing account in Okta with exactly the same email address.
A. Configure Visma Single Sign-On app with Okta
Sign in into Authentication Settings and go to the Single Sign-On page
Enter your mydomain (i.e. example)
“Add OIDC Identity Provider" choose Okta.
From the Configure URIs in Okta section, copy the generated Redirect URI
B. Configure the OIDC application in Okta
Open a new tab/window in your browser and follow these steps:
Sign in to your Okta account
Go to Applications > Applications.
To create an app integration, click Create App Integration.
Select OIDC - OpenID Connect as Sign-in method
Under Application type choose the type Web Application and click Next
Enter the following details in General Settings and click Next.
App integration name: Visma (or your preferred app integration name)
App Logo (optional): Upload in PNG, JPG, or GIF format. The logo size must be less than 1 MB.
Sign-in redirect URIs: Paste the value copied from step A.4 (from Authentication Setting Configure URIs in Okta section, copy the generated Redirect URI ) i.e https:/example.my.connect.visma.com/oidc/callback
Under Assignments: Select if you’d like to assign all users or only a specified group then click Save
From the Client Credentials section copy your Client ID and check the option to “Require PKCE as additional verification“
Note you will also have to copy the client secret value from Client secrets, so keep the window open
C Go back to Authentication Settings to continue the Single Sign-On setup with Okta
Keep Okta open in another window to be able to copy/paste values from there into Authentication Settings.
On section 2 Configure OpenID Connect Client enter the Authority value for your OKTA tenant url
Paste on Client ID the value copied at step B.7 from Okta
Paste the Client secret copied at step B.8 from Okta ( Client secrets section in Okta)
Now go to 3.Advanced Configuration you can decide if you wish to Just in time provision users when they sign with Okta into Visma.
Click SAVE
D. Test the Single Sign-On with Okta
To make sure SSO is working, go to your Visma MyDomain e.g. https://example.my.connect.visma.com directly, and then click the Sign in with Okta button.