Overview
This document explains how to configure Okta Single Sign-On (SSO) for the Epicode Portal using OpenID Connect (OIDC).
Since Okta configurations are organization-specific, the application integration must be created in your Okta Admin Console.
Once completed, please share the required configuration details with our team.
Prerequisites
Okta Admin access
Access to the Okta Admin Console
Redirect URI provided by the Epicode team
Step 1: Log in to Okta Admin Console
Log in to your Okta tenant:
https://your-org.okta.com/admin
Navigate to:
Applications → Applications
Step 2: Create a New App Integration
Click Create App Integration
Select:
Sign-in method: OIDC – OpenID Connect
Application type: Web Application
Click Next
Step 3: Configure General Settings
Fill in the following details:
App Information
App name: Any preferred name)
(Optional) Add logo or description
Grant Types
Ensure the following are selected:
Authorization Code
Refresh Token (optional but recommended)
Step 4: Configure Sign-in Redirect URIs
Under Sign-in redirect URIs, add the URI provided by the Epicode team
Step 5: Assign Users or Groups
Under Assignments, assign:
Specific users, or
Relevant user groups who should access the License Portal
Step 6: Save the Application
Click Save to create the application.
Step 7: Collect Required Configuration Details
After saving the app, navigate to the General tab and share the following details with us:
Okta Domain
Example: https://your-org.okta.com
Client ID
Client Secret
Configured Redirect URI (for verification)
Step 8: Create access policies
Need access to following scopes : openid, profile, email
Follow the below link : https://help.okta.com/oie/en-us/content/topics/security/api-config-access-policies.htm
Official document for Reference :