Okta

Our Okta app integration is still under review.

This guide explains how to configure Okta as an Identity Provider for your organization to access the Requirement Yogi standalone application using our official app from the Okta Integration Network (OIN).

Prerequisites

  • You need an administrator account on your Okta organization.

Supported features

  • SP-initiated SSO (Single Sign-On) : This authentication flow occurs when the user attempts to log in to the application from the Requirement Yogi standalone application.

  • Just-In-Time provisioning : This means that we automatically create user accounts in the Requirement Yogi standalone application for your Okta users the first time they log in using the Single Sign-On.

Configuration steps

Step 1 - Add the app from the OIN catalog

  1. Navigate to your Okta Admin Console

  2. Navigate to Applications > Applications

  3. Click Browse App Catalog

  4. Search for Requirement Yogi and select it from the results

  5. Click Add Integration

  6. You should be redirected to the general settings of the application

  7. Provide your data residency region (EU or US)

  8. If you don’t know your data residency region, feel free to contact our support team.

  9. Click Done.

Step 2 - Assign users or groups

Only users and groups assigned to the application in Okta will be able to sign in.

  1. Navigate to Applications > Applications

  2. Select the newly added Requirement Yogi application

  3. Navigate to the Asssignments tab

  4. Click Assign

  5. Choose Assign to People or Assign to Groups

  6. Select the users or groups that should have access to Requirement Yogi

  7. Click Save and Go Back

  8. Click Done

Step 3 - Copy your Okta application credentials

Once the application is added, you need to retrieve the credentials to complete the setup.

  1. Navigate to Applications > Applications

  2. Select the newly added Requirement Yogi application

  3. Navigate to the Sign On tab

  4. Scroll to Settings > Sign on methods > OpenID Connect

  5. Note down the following values for the next step:

    • Client ID

    • Client secret

Step 4 - Contact the support to enable the integration

  1. Navigate to our Support page

  2. Create a new ticket (e.g. Configure Okta integration for [COMPANY NAME])

  3. Provide the following details:

    • Your Okta subdomain (for example, https://acme-corp.okta.com)

    • Your email domain (for example, @acme.com)

    • Client ID (from the previous step)

    • Client secret (from the previous step)

  4. For security reasons, we may ask you to confirm the ownership of the email domain.

  5. Then, our team will configure the authorization server to use your identity provider for the provided email domain.

Note:
For now, the process of configuring an identity provider is manual. In the future, we plan to build a dedicated interface to help you manage the identity providers of your organization directly from the standalone application.

Step 5 - Test the integration

Once the support team has processed your ticket:

  1. Open a private/incognito browser window

  2. Navigate to the standalone application

  3. Click Log in

  4. You should be redirected to the login page of the standalone application

  5. Provide the email address of an Okta user that has been assigned to the Okta application

  6. You should be redirected to your Okta SSO portal

  7. Authenticate using the credentials of the Okta user

  8. You should be redirected to the standalone application

  9. Navigate to Settings > Profile

  10. Confirm that the user details are correct

SP-initiated SSO

  1. Navigate to the standalone application

  2. Click Log in

  3. You should be redirected to the login page of the standalone application

  4. Provide the email address of your Okta user

  5. You should be redirected to your Okta SSO portal

  6. Authenticate using your Okta credentials

  7. You should be redirected to the standalone application

Troubleshoot

If you encounter any issues or have any questions, feel free to contact our support team.