Configure SSO with OpenID Connect (OIDC) on Merox (example with Okta)

Modifié le  Mer, 25 Mars à 2:00 H

Creating a Merox application within Okta


From your administrator interface on Okta, go to “Applications”, then “Create App Integration”. 


In the wizard, select the options ‘OIDC – OpenID Connect’ and then ‘Web application’. 


 

In the next step, enter the following information:

  • App integration name
    • For example: ‘Merox OIDC’ (the name is up to you)
  • Sign-in redirect URIs
    • https://auth.merox.io/meroxauth.onmicrosoft.com/oauth2/authresp
  • Sign-out redirect URIs
    • Delete the existing line
  • Assignment / Control access
    • ‘Allow everyone in your organisation to access’ 
    • If you are familiar with authorised applications, you can restrict access to the application to certain users, but in any case, only accounts created in the Merox application will be able to access the platform.

Then click ‘Save’.



Information to be provided to the Merox team

Once the application has been created, send the following information to the Merox team:

  • Client ID
  • Client Secret
    • Hidden by default, use the ‘eye’ symbol to view it, or the ‘copy’ button
  • Okta domain
    • If you do not know it, you can find the default domain in the administration interface, under ‘Security > API’. Please note that it may have been customised in production.
  • Email domain(s) affected by SSO management

You can find the information in the screenshots below.



 



Cet article a-t-il été utile ?

C'est super !

Merci pour votre commentaire

Désolé ! Nous n'avons pas pu vous être utile

Merci pour votre commentaire

Dites-nous comment nous pouvons améliorer cet article !

Sélectionner au moins l'une des raisons
La vérification CAPTCHA est requise.

Commentaires envoyés

Nous apprécions vos efforts et nous allons corriger l'article