Okta
You can set up Single Sign-on (SSO) with Okta for your team.
This section helps you to create an OIDC application with Okta. The Client ID, Client Secret, and Issuer URL of this OIDC application are required to setup SSO in Gitpod. See the Step-by-step guide for the general instructions.
Prerequisites
As prerequisites you will need the following:
- Access to your Okta instance
- Permission to create an app integration
Create an OIDC application
-
On the Okta Admin dashboard, navigate to Applications
-
Select
Create App Integration
Applications - Okta Dashboard
-
Select the following options and click Next
- Sign-in method:
OIDC - Open ID Connect
- Application type:
Web Application
Create App Integration - Okta Dashboard
- Sign-in method:
-
Specify General Settings
- App integration name, e.g.
Gitpod
- Sign-in redirect URIs:
https://app.gitpod.io/auth/oidc/callback
- Sign-out redirect URIs:
none
Specify Okta settings - Okta Dashboard
- App integration name, e.g.
-
Assignments
- You have to select Okta users or groups which would be allowed to use the integration with Gitpod.
- Okta let’s you import and synchronize directories, which then can be assigned to use the integration.
Specify Assignments - Okta Dashboard
-
Obtain Client ID, Client Secret from General tab
Configure Client Secrets - Okta Dashboard
-
Obtain Issuer URL
Issuer - Okta Dashboard
-
Continue with the SSO configuration in Gitpod: Clicking Save & Test
Was this page helpful?