Skip to main content

Okta OIDC

Step-by-step instructions for setting up Okta OIDC authentication with Modjo.

Updated over 10 months ago

This article provides detailed instructions to help you set up Okta OIDC authentication with Modjo.

By following this guide, you will learn how to:

• Configure an OIDC application in your Okta Admin Console, with the correct redirect URIs and scopes.

• Implement the authentication flow within your Modjo instance.

• Enable secure single sign-on (SSO) for your sales teams, while ensuring proper access control.

🚨 Important Notes

  • When Okta SSO is enabled in Modjo, Google SSO and Microsoft SSO options are automatically disabled.

  • Users must be created in Modjo with the exact same email address used in your Okta directory.

Setup Instructions

Step 1: Configure your application in Okta

  • Log in to your Okta Admin account.

  • Click on Admin, then go to Applications.

  • Click on Create App Integration.

  • Select OIDC - OpenID Connect as the Sign-in method.

  • Choose Web Application as the Application Type.

  • For Trusted Origins and Assignments, there are no mandatory configurations — you can define these based on your internal policies.

  • Click Next.

  • In General Settings, enter an App Integration Name, such as Modjo via OIDC. Optionally, add a logo.

  • In the Sign-in redirect URIs field, enter: https://app.modjo.ai/sso/okta_sso

  • Remove the Sign-out redirect URIs

  • In Assignments, choose one of the following options:

    • Limit access to selected groups: Specify the names of the Okta groups that should have access to Modjo.

    • Skip group assignment for now: This allows you to create the app without assigning any groups immediately.

  • Click Save.

Your OIDC custom Okta app is now created.

To finish the setup, configure the app by assigning users or groups to it

  • Go to the LOGIN in the General tab.

  • Click the Assignments tab.

  • Assign users and/or groups that should have access to Modjo. Make sure the email addresses in Okta match those used in Modjo

Step 2: Configure Okta OIDC in Modjo

  • In your Okta app, copy the Client ID and Client Secret.

  • Next, copy your Okta domain from your Okta Admin page. You can find this at the top-right corner of your Okta dashboard — the domain typically looks like:
    'company.okta.com'.

  • Now, log in to Modjo.

  • Go to Settings in the left-hand menu, then select Integrations.

  • Open the SSO tab and select Okta.

  • Click on Connect

  • Paste the Client ID, Client Secret, and Okta domain into the relevant fields.

  • Click on Save.

Okta SSO is now enabled for your Modjo instance.

Usage: Logging in with Okta SSO

  • On the Modjo login page, click Sign in with SSO.


  • You will be redirected to Okta to authenticate.

  • Once authentication is successful, you will be automatically redirected back to Modjo to continue your session.

Did this answer your question?