Configure Single Sign-On for Okta
If Okta is your org's Identity Provider, you can configure Single Sign-On (SSO) access to Identity Security Posture Management (ISPM) using the Okta Identity Security Posture Management - SSO OIDC app.
Before you begin
Ensure that you're signed in to Okta as a super admin, app admin, or a custom admin role with app management permissions.
Add the Okta ISPM SSO app
- In the Admin Console, go to .
- Click Browse App Catalog.
- Search and select the Okta Identity Security Posture Management - SSO OIDC app.
Check that you've selected Okta Identity Security Posture Management - SSO OIDC app and not Okta Identity Security Posture Management API app.
- Click + Add integration.
- On the General Settings tab, enter the required information. In the Subdomain field, enter your ISPM subdomain. For example, if your URL is https://your-subdomain.spera-app.com/, enter your-subdomain in the field.
- Click Done.
- From the Sign On tab, copy the client ID and secret and store the information safely.
-
On the Assignments tab, click Assign and follow the prompts on the UI to assign this app to users. Okta recommends that you assign the app using group assignment instead of individual assignment.
Alternatively, you can also get the app from the Okta Integration Network page and follow the instructions starting from step 4.
Share the parameters with ISPM
- In the Identity Security Posture Management console, go to .
- Select Configure Okta SSO.
- Enter the following information:
- Your Okta domain URL. For example, https://your-company.okta.com
- Client ID
- Client secret
- Click Submit.