Back to Cal

Setting up OIDC with okta

docs/developing/guides/auth-and-provision/how-to-setup-oidc-with-okta.mdx

6.2.02.1 KB
Original Source
<Steps> <Step title="Create an application with your OIDC provider"> For example, in Okta, once you create an account, you can click on Applications on the sidebar menu:
</Step>
<Step title="Click on Create App Integration">
    
</Step>
<Step title="Select OIDC in the modal form, along with Web App, and click Next">
    
</Step>
<Step title="Enter the Sign in redirect URL and sign out URL">
    Enter the Sign in redirect URL (or auth URL) as:
    ```
    https://app.cal.com/api/auth/oidc
    ```
    And the sign out URL as:
    ```
    https://app.cal.com/auth/login
    ```
    
</Step>
<Step title="Gather Client Secret, Client ID, and Well Known URL">
    Now you should have the Client Secret and Client ID with you. You would also need the Well Known URL which for Okta is generally of the type:
    ```
    https://{yourOktaDomain}/.well-known/openid-configuration
    ```
    So, if your Okta domain is `dev-123456.okta.com`, your well known URL would be:
    ```
    https://dev-123456.okta.com/.well-known/openid-configuration
    ```
</Step>
<Step title="Log in">
    Log in with the Organization Admin user.
</Step>
<Step title="Go to Organization SSO Settings">
    Visit `https://app.cal.com/settings/organizations/sso` and you should see something like this:
    
</Step>
<Step title="Configure SSO with OIDC">
    Click on Configure SSO with OIDC, and then enter the Client Secret, Client ID, and Well Known URL from Step 5, and click save.
    
</Step>
</Steps>
    That's it. Now when you try to login with SSO, your application on Okta will handle the authentication.