Single Sign-On with Okta

Setup Single Sign-On (SSO) with Okta

To set up SSO in AppNavi with Okta, follow the steps below,

Step# 1 Create a new Application in Okta

  1. On the Okta administrator Menu click on the APPLICATIONS dropdown.
  2. Now click on the Applications button in the dropdown and the add application page will appear.
  3. To add a new application, click on Create App Integration and all sign-in methods will appear in a window.
  4. In Create a new app integration window, select OIDC - OpenID Connect as the sign-in method and a new section will appear for selecting the Application type.
  5. Now Select Web Application as the application type that is integrated with Okta and click on the Next button.
  6. A new page will appear New Web Integration with all settings.
  7. In the general settings, enter the integration name, for example "AppNavi SSO", into the App integration name field.
  8. Select Client Credentials checkbox.
  1. Open the AppNavi portal and click on Manage Settings and the settings tab will open.
    the URL from the Callback URI field.
  2. Click on the Single Sign On toggle button to enable the OAuth tab and save changes and then open the OAuth tab.
  3. Now copy the URL from the Callback URI field and go back to Okta to the New Web Integration page in the General Settings.
  4. Paste the Callback URL that you copied earlier into the field under Sign-in redirect URIs.
  5. Now under Assignments, select the appropriate access level according to your organization usage.
  6. Click Save to save all the settings.

Step# 2 Build and enter URIs in AppNavi Settings

To build all the Uniform Resource Identifiers (URIs) that are needed for configuring OAuth 2.0, follow these steps:

  1. Open Okta admin and copy the Okta domain "https://{yourOktaDomain}/oauth2" from the Okta admin.

  2. Now open the AppNavi portal and go to Manage Tenant Settings and click on OAuth tab to open the SSO settings.

  3. Now in the Authorization URI field, paste the Okta domain that you copied earlier and use it as a basis to build the URI (for example "https://{yourOktaDomain}/oauth2/v1/authorize").

  4. In the Token URI field, enter "https://{yourOktaDomain}/oauth2/v1/token".

  5. Under UserInfo URI, select "GET" from the drop-down menu and paste the UserInfo endpoint URL "https://{yourOktaDomain}/oauth2/v1/userinfo" into the field.

  6. Now select the Skip reading entities from ID token checkbox. This means that user information, specifically the user email address, will be read upon login from the UserInfo URI instead of the token URI.

  7. Open the Okta administrator dashboard and click on  Security tab.

  8. Now click on API tab from the last in the drop down and the API settings window will open.

  9. Now copy the Issuer Url from the Authorization Servers Settings section and paste it in the OAuth settings under the Issuer URL in the AppNavi portal.

  10. Return to the Appnavi portal’s Settings page, on the OAuth tab, Paste the Issuer that you copied earlier from Okta into the Issuer field.

  11. In the Scopes field, enter "openid, email". "Email" represents the field in which the user's email address is stored.

  12. Go to Okta administrator dashboard >  APPLICATIONS > Applications, Select the active application, on the General tab, under Client Credentials, copy the Client ID.

  13. Return to the Appnavi portal’s Settings page, on the OAuth tab, Paste the Client ID that you copied earlier from Okta into the Client ID field.

  14. Return to Okta and open the application integrated and all the settings will appear.

  15. In the General settings under Client Credentials section, copy the Client ID.

  16. Return to AppNavi. Paste the Client ID that you copied earlier from Okta into the Client ID field.

  17. Now copy the Client Secret from Okta and paste it under the Client Secret field.

  18. Under the Claim Field, select Use default from the drop down provided.

  19. Return to OKTA account and click on APPLICATIONS in the menu and click on theApplications button from the drop down and select the application that you integrated.

  20. Now click on the Sign-On tab and click on the edit button of the user authentication options.

  21. Click on the drop down and select the best option suitable and click save.

Step# 3 Review and Test

  1. Review the data that you have entered in the AppNavi portal in the OAuth settings.

  2. When you are certain that you have entered all the data correctly, click Save Changes to save the data.

  3. To test the OAuth connection, click on the Test Configuration to test the connection settings.

  4. If there are errors, a message will be shown to the user and will be redirected to Okta.


To be able to use SSO, the user must be added to both Okta and AppNavi. The email address that is entered in Okta under Directory > People > Primary must match the email address used in AppNavi.

  1. If the settings are correct then the portal will redirect to a sign-in page on the portal to login to portal using the Okta user id.
  2. To succesfully login to the portal using a Okta id, the user must create a user with same user email on the portal which was used to create an account or sub account on Okta.

Note: Sub accounts can be created using the admin Okta account and then user can use the same email to login to the AppNavi Portal.