This guide will set up a custom Okta OIDC Application that will allow your users to login to Hava. These steps can be followed for most SSO identity providers, though the field names may be different. Custom apps will be coming soon.
Log into Hava and head to your Account Settings. From there select SSO Config, then click OIDC on the protocol selection page. This will show you the Service Provider values you will need to enter into Okta
Log into Okta and click Applications → Create App Integration
Select ‘OIDC - OpenID Connect’ and then ‘Web Application’ for the Application type, then click Next
Enter the following details into the settings:
Name should be Hava
Grant Type should be Authorization Code
Sign-in redirect URIs should be set to the value of Sign-in Redirect URI from the Service Provider section in Hava
Assignments should be set based on your requirements
All other values can be left as the defaults. Click Save to complete the Okta setup.
Head back to the Hava SSO OIDC config page and select Add OIDC Config
Enter the config values from the Okta setup instructions:
Identity Provider Host should be set to Okta domain without any prefix or trailing slash, i.e. test-oidc.okta.com and not http://test-oidc.okta.com/