Heads up! On October 1, we introduced Gitpod Flex. You can swap between documentation by using the switcher in the left navigation bar.

Single Sign-on with Okta

You can set up Single Sign-on (SSO) with Okta for your team.

This section helps you to create an OIDC application with Okta. The Client ID, Client Secret, and Issuer URL of this OIDC application are required to setup SSO in Gitpod. See the Step-by-step guide for the general instructions.

Prerequisites

As prerequisites you will need the following:

Create an OIDC application

  1. On the Okta Admin dashboard, navigate to Applications

  2. Select Create App Integration

    Applications - Okta Dashboard

  3. Select the following options and click Next

    • Sign-in method: OIDC - Open ID Connect
    • Application type: Web Application

    Create App Integration - Okta Dashboard

  4. Specify General Settings

    • App integration name, e.g. Gitpod
    • Sign-in redirect URIs: https://app.gitpod.io/auth/oidc/callback
    • Sign-out redirect URIs: none

    Specify Okta settings - Okta Dashboard

  5. Assignments

    • You have to select Okta users or groups which would be allowed to use the integration with Gitpod.
    • Okta let’s you import and synchronize directories, which then can be assigned to use the integration.

    Specify Assignments - Okta Dashboard

  6. Obtain Client ID, Client Secret from General tab

    Configure Client Secrets - Okta Dashboard

  7. Obtain Issuer URL

    Issuer - Okta Dashboard

  8. Continue with the SSO configuration in Gitpod: Clicking Save & Test

Feature waitlist

By submitting this, I confirm that I have read and understood the privacy policy.

Was this helpful?