Okta
This guide explains how to enable Single Sign-On (SSO) login via Okta in Open Loyalty.
Last updated
Was this helpful?
This guide explains how to enable Single Sign-On (SSO) login via Okta in Open Loyalty.
Last updated
Was this helpful?
Ensure you have the access to the following:
An active Open Loyalty instance.
Administrator access to your Okta tenant.
Basic understanding of OIDC and SSO concepts.
Ensure that the email address you want to use for SSO login does not already exist in the Open Loyalty portal.
If an email address for the admin already exists in Open Loyalty, the SSO login will not function for that account. To enable SSO for a user, ensure there are no conflicts.
For instance, you could deactivate admin users logging in with email and password, update their email addresses by adding a suffix (e.g., "-old"), and then ask the admin users to log in via SSO.
App integration name: (e.g. Open Loyalty)
Sign-in redirect URIs:
(or your production redirect URI)
Sign-out redirect URIs (optional):
https://your-production-domain.com
Assign Users to the Application
In the Assignments tab of the application, click Assign.
Choose Assign to People or Assign to Groups.
Select the users or groups who should have access to the application.
Click Save.
Ensure that the Default Role is configured appropriately to avoid granting unintended permissions to new users.
If an email address already exists in Open Loyalty, the SSO login will not work for that account. Ensure there are no conflicts before enabling SSO for a user.
If login fails, double-check the URL and Client ID configuration.
Ensure the callback URL is correctly set in Okta.
Verify that the Okta application has been configured to allow the Open Loyalty URL.