Prerequisites
- An Okta account with admin access
- Your Okta Client ID, Client Secret, and Issuer URL
Configure Okta OAuth
Create an application on Okta
- Log in to the Okta Admin Console
- Navigate to Applications > Applications
- Click Create App Integration
- Select OIDC - OpenID Connect as the sign-in method
- Select Web Application as the application type
- Click Next
- Enter a name (e.g. “Prelude Session”)
- Under Sign-in redirect URIs, replace the default value with:
${YOUR_CUSTOM_DOMAIN} with your custom domain (e.g. session.yourapp.com).- Click Save
- Copy the Client ID and Client Secret from the application settings page
The redirect URI must match exactly. Make sure there is no trailing slash and that you are using
https.Note your Issuer URL
Your Issuer URL is found in Security > API > Authorization Servers in the Okta Admin Console (e.g.
https://dev-123456.okta.com/oauth2/default). You will need it in the next step.Create the Okta OAuth configuration
| Field | Description |
|---|---|
client_id | Your Okta OAuth client ID. |
client_secret | Your Okta OAuth client secret. |
enabled | Set to true to enable Okta login. |
okta.issuer_url | Your Okta authorization server Issuer URL (e.g. https://dev-123456.okta.com/oauth2/default). |
options.use_email_as_identifier | When true, the user’s Okta email is stored as an email identifier. |
options.allow_email_account_merge | When true, if a user with the same email already exists, the Okta account is linked to the existing user. |