SSO
Okta OIDC
Overview
OpenID Connect (OIDC) Single Sign-On allows your organization to manage authentication through your existing identity provider. This integration streamlines user access, enhances security, and simplifies user management across your organization. Currently, Bronto supports using OKTA with OIDC.
Step 1: Create an OIDC Application in Okta
- Sign in to your Okta Admin Dashboard
- Navigate to Applications > Applications
- Click Create App Integration
- Select OIDC - OpenID Connect as the Sign-in method
- Choose Web Application as the Application type
- Click Next
- Enter an Application name (e.g., “Bronto”)
- Add the following Redirect URI which will depend on your Bronto accounts region:
- EU:
https://auth.eu.bronto.io/oauth2/idpresponse
- US:
https://auth.us.bronto.io/oauth2/idpresponse
- EU:
- Under “Allowed grant types,” ensure “Authorization Code” is selected
- Under “Assignments,” select which users or groups should have access
- Click Save
- Note the Client ID and Client Secret from the application details
Step 2: Configure SSO in Bronto
- Navigate to Settings > Organization Settings > SSO > Configure new.
- Select “OIDC” from Idp type dropdown
- Enter the following information:
- Display Name: “Okta” (or your preferred label)
- Issuer URL:
https://your-okta-domain.okta.com
(your Okta tenant URL) - Client ID (from Step 1)
- Client Secret (from Step 1)
- Choose email domains to associate with this identity provider. eg your-company.io
- Configure mapping of attributes, Okta’s default is given_name, family_name and email
- Upload and Enable
- Copy Start URL Value
Step 3: Add URL to OKTA
- Once Step 2 is complete you be presented with a popup window in Bronto containing 3 sections.
- Copy the Start URL value
- Go to Okta App created above, select edit next to General Settings
- Paste Start URL value from step 2 into Initiate login URI field, save
- Ensure Login initiated by is set to: Either Okta or App
- Ensure Display application icon to users enabled.
Troubleshooting
- Authentication fails: Verify the Client ID and Client Secret are correct
- Redirect errors: Ensure the redirect URI exactly matches what’s configured in Okta
- User cannot access the application: Check group assignments in Okta
- Missing user information: Verify attribute mapping in both Okta and Bronto
- App Missing from Okta panel: Ensure “Login initiated by” setting is set to “Either Okta or App”, is assigned to users and “Application visibility” is set to “Display application icon to users”