Configure Single Logout in app integrations
Single Logout (SLO) is a feature in federated authentication where end users can sign out of both their Okta session and a configured application with a single action.
Okta supports this sign out process only when initiated by a Service Provider (SP). The SP sends the SLO request to Okta to end the Okta session.
- SWA applications don't support the SLO operation.
- SLO doesn't sign the end user out of other integrations that may be open.
- Okta doesn't sign out web applications.
- Not all app integrations support SLO. If the SP supports SLO in their downstream application, it is noted as a supported feature in their app configuration guide. Contact your SP directly to request that they add support for SLO.
Enable SLO for SAML integrations
For SAML applications, the SP must be able to send an SLO request to Okta as a POST request and it must be signed.
If you are using Okta for Single Sign-On (SSO) and you want to close and sign out of the Okta session, you can use the SAML Application Integration Wizard to configure SLO:
- In the Admin Console, go to .
- Click the SAML application where you want to add SLO.
- In the General settings tab, on the SAML Settings panel, click Edit.
- In the SAML configuration wizard, click Next.
- On the Configure SAML page, click Show Advanced Settings.
- Select Allow application to initiate Single Logout.
- Single Logout URL — the URL for the SLO return. This is a URL on the service provider where Okta sends its sign out response (as a POST operation). If the SP doesn't have a specific SLO URL, the main SP URL can be used.
- SP Issuer — the identifier for the application. This can be an ACS URL or the SP Entity ID. This value is also included in the metadata sent in the SLO request from the SP application.
- Signature Certificate — Okta requires a digital signature for the SLO request. You need to upload a copy of the signature certificate or CA that the SP is using to sign the SLO request.
- Click Next.
- Click Finish.
Finally, you need to retrieve the SLO details needed by your SP application:
- In the Sign On settings tab, on the Settings panel, click View Setup Instructions.
- The page that appears shows the Identity Provider Single Logout URL. Copy this URL and add it into the configuration settings back in your SP application.
- To test your SLO flow, sign in to your SP application using the Okta integration and then use the appropriate sign out method from within the SP application. The browser should sign you out of both your SP application and Okta.
Enable SLO for OIDC integrations
For OpenID Connect (OIDC) integrations, the SP application must be configured to send an SLO request to Okta as a GET request. The application should redirect to this Okta endpoint:
GET https://{baseUrl}/logout?id_token_hint=${id_token}&post_logout_redirect_uri=${post_logout_redirect_uri}&state=${state}Where:
- baseURL is the URL for your Okta org.
- id_token is the OIDC token issued by Okta during sign on.
- Optional. The post_logout_redirect_uri is the Logout redirect URI where Okta redirects the user after the SLO operation. This URI must be listed in the Logout redirect URIs configuration in the General Settings for your Okta integration.
- Optional. The state is any string to be added as parameter upon redirect to the SLO URI.
After this request is processed, the id_token is invalidated and the user is signed out from Okta.
For more details on the GET request to the API, see the OpenID Connect & OAuth 2.0 API reference.
For application developers, language-specific instructions are also available in our Sign users out developer guide.
Finally, you need to add the Logout redirect URIs to your Okta integration:
- In the Admin Console, go to .
- Click the OIDC application where you want to add SLO.
- In the General settings tab, click Edit.
- Beside the Logout redirect URIs, click + Add URI.
- Enter the URI where Okta will send relying party-initiated SLO requests.
- Click Save.
- To test your SLO flow, sign in to your SP application using the Okta integration and then use the appropriate sign out method from within the SP application. The browser should sign you out of both your SP application and Okta.