This article walks you through setting up single sign-on to AudioEye using Okta.
Configuring SSO with AudioEye requires you to provide three pieces of information from Okta:
- Application ID
- Client Secret
- OpenID Connect URL (Issuer)
This guide will show you how to set up in Okta and obtain the information you need to provide back to AudioEye to complete the process.
Step 1: Register AudioEye as a New Application Integration
- Log in to your Okta organization portal as an admin.
-
Using the left sidebar menu, navigate to Applications and select the Applications sub menu.
- Click on the Create App Integration button.
- In the create application modal select OIDC - OpenID Connect.
- An application type section will now be displayed in the same modal. Select Web Application for this section.
- Click on the Next button.
Okta will now display a screen that allows you to configure the application, which is the next step continued below.
Step 2: Configure the Application
- Enter the application display Name, for e.g. AudioEye.
- Add a Logo if desired (optional).
-
Under Sign-in redirect URIs, enter https://auth.audioeye.com/oauth2/idpresponse into the text box.
- Under Sign-out redirect URIs, enter https://portal.audioeye.com/logout into the text box.
- Under controlled access select which group should have access to the application. Select “Allow everyone in your organization to access” to make it available to all members of your organization.
- Click on the Save button.
When Okta has created your app, you'll be redirected to the General tab, which displays your app information. You will need some of this information for the next step, do not navigate away.
Step 3: Collect App information to send to AudioEye
At this stage the SSO configuration has been completely set up in Okta. Now AudioEye will need to complete up the configuration on our end, which requires some information from your SSO setup.
Use the steps below to retrieve the Application ID, Application Secret, OIDC URL and Domains and replace the values with your own in a test file that can be sent to your AudioEye account manager.
Application ID: ae200aed-3041-41ba-bf42-ddee110eccf9
Application Secret: y9X8Q~VEe4~3GY_WfP9gobNXaYfmcvXgUKIzubq5
OIDC URL: https://login.microsoftonline.com/3384d6d9-8416-44a5-aa3b-7b2e07f4c777/v2.0/.well-known/openid-configuration
Domains: my-domain.com, my-domain.org
-
Prepare a text file with the above format so that you can copy the values out of Okta and replace them in the file.
- On your application's General tab, look for the Client Credentials section.
- Copy the Client id and paste it into the Application ID value (replace the placeholder)
- Copy the Client secret and paste it into the Application Secret value (replace the placeholder)
- Click the Sign On tab (next to the general tab on the app's Overview page). Find the OpenID Connect ID Token section.
- Copy the Issuer value.
- Paste that into the OIDC URL value in the test file.
-
Under domains enter the email domains used for company accounts that you plan to have accessing AudioEye. If you have more than one, specify them as a comma separated list.
-
Once complete save the file and send it to your AudioEye Account manager so that we can complete the SSO setup on our end.