docs/developing/guides/auth-and-provision/how-to-setup-oidc-with-okta.mdx
</Step>
<Step title="Click on Create App Integration">
</Step>
<Step title="Select OIDC in the modal form, along with Web App, and click Next">
</Step>
<Step title="Enter the Sign in redirect URL and sign out URL">
Enter the Sign in redirect URL (or auth URL) as:
```
https://app.cal.com/api/auth/oidc
```
And the sign out URL as:
```
https://app.cal.com/auth/login
```
</Step>
<Step title="Gather Client Secret, Client ID, and Well Known URL">
Now you should have the Client Secret and Client ID with you. You would also need the Well Known URL which for Okta is generally of the type:
```
https://{yourOktaDomain}/.well-known/openid-configuration
```
So, if your Okta domain is `dev-123456.okta.com`, your well known URL would be:
```
https://dev-123456.okta.com/.well-known/openid-configuration
```
</Step>
<Step title="Log in">
Log in with the Organization Admin user.
</Step>
<Step title="Go to Organization SSO Settings">
Visit `https://app.cal.com/settings/organizations/sso` and you should see something like this:
</Step>
<Step title="Configure SSO with OIDC">
Click on Configure SSO with OIDC, and then enter the Client Secret, Client ID, and Well Known URL from Step 5, and click save.
</Step>
That's it. Now when you try to login with SSO, your application on Okta will handle the authentication.