Skip to main content
Skip table of contents

Setting up Yotascale SSO to use OKTA OpenID

How to setup Yotascale SSO with Okta using Okta OpenID

Currently Yotascale provides support for Google Auth, SAML (through Okta or Ping Identity) or Okta OpenID authentication in addition to username/password logins. Google Auth can be used alongside any 1 of the other Authentication Providers. Adding SAML or OpenID will override the username/password authentication. This guide focuses on setting up Okta as your IdP using Yotascale's Okta OpenID authentication provider.

Yotascale - Retrieve OpenID auth data:

  1. Login to Yotascale with a user that has Admin role access

  2. Go to the Settings Menu

  3. Under Users and Permissions select Manage Auth Providers

  4. Select "+ New Provider"

  5. Select Okta OpenID

  6. Enter an Organization name

  7. At bottom of page copy and save the Redirect URL:

    • https://login.yotacale.io/login/callback

  8. Leave this page open

Okta - Create Application

  1. Login to Okta

  2. Select Application Tab

  3. Select "Create App Integration"

  4. In the popup view select “OIDC - OpenID Connect”

  5. And then select "Web Application" and click “Next”

  6. For App Integration Name enter a name: example: “Yotascale OIDC”

  7. For Sign-in redirect URIs enter the saved Redirect URL copied from Yotascale

  8. Select “Allow everyone in your organization to access” to allow Yotascale for all users in your domain or “Limit access to selected groups” if you want only certain users to have access

    1. NOTE: Yotascale allows you to control what users can see in the app through Role Based Access Control so limiting access to the app is often unneeded

  9. Select "Save"

  10. You should now be in the Client Credentials window

  11. Copy and save the Client ID

  12. Copy and save the Client secret

Yotascale - Complete Okta OpenID Auth Provider configuration

You should still be logged in and on the Okta OpenID Auth Provider configuration page

If not, login again to Yotascale with a user that has Admin role access

Follow the same steps to add new OpenID Auth provider as describe  above.

Make sure to add the same Organization name for OpenID

Enter the following information:

  1. Organization name already entered

  2. Okta Domain URL -Add your Okta Domain here

  3. Client ID - Enter the Client ID that was copied from the Okta application

  4. Client Secret - Enter the Client Secret that was copied from the Okta application

  5. Tenant Domain - enter the domain name of your users. If you have more than one domain, you will need to configure a separate Auth Provider for each one.

  6. Auto Provisioning

    1. Make sure this is Enabled - When user authenticates through Okta, the user account will automatically be created in Yotascale User list.

  7. Active - Make sure this is Enabled, if it is disabled this Auth Provider will not be used at login.

  8. Default Group - when a user first logs into Yotascale, they will be automatically added to this User Group

  9. Select “Add Auth Provider”

Configuration is now complete and users should be able to login via Okta successfully.

If you run into any issues, please contact our support team.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.