# Okta SSO (OIDC)

### Overview

Sumble supports Single Sign-On (SSO) via Okta, allowing your team to log in to Sumble using their existing Okta credentials. Once configured, users can authenticate through Okta instead of using email-based login methods.

Optionally, SSO can be enforced so that all users on your domain must log in through Okta, blocking Google OAuth and Magic Link authentication.

***

### Prerequisites

* Access to the Okta Admin Console
* An Okta plan that supports OIDC (OpenID Connect) applications

***

### Step 1: Create the Okta Application

1. In Okta Admin Console, go to **Applications** > **Create App Integration**
2. Select **OIDC - OpenID Connect** and **Web Application**
3. Set the **Sign-in redirect URI** to: `https://sumble.com/account/login/okta/callback`
4. Under **Assignments**, assign the users or groups who should have access to Sumble
5. Complete the setup and copy the **Client ID** and **Client Secret**
6. Find your **Issuer URL**: Go to **Security** > **API** > **Authorization Servers**, select your server (usually "default"), and copy the Issuer URI (e.g., `https://your-org.okta.com/oauth2/default`)

***

### Step 2: Configure the Access Policy

Ensure the authorization server has an Access Policy that allows your Sumble application:

1. Go to **Security** > **API** > **Authorization Servers** > \[your server] > **Access Policies**
2. Either add your Sumble app to an existing policy, or create a new policy
3. The policy must allow the following scopes: `openid`, `email`, `profile`

***

### Step 3: Share Credentials with Sumble

Share the following with your Sumble Customer Success Manager:

* **Client ID**
* **Client Secret**
* **Issuer URL** (from Security > API > Authorization Servers)

> The Issuer URL must come from **Security > API > Authorization Servers**, not just your Okta domain. For example, `https://your-org.okta.com/oauth2/default` rather than `https://your-org.okta.com`.

Your Sumble Customer Success Manager will configure SSO on your account and confirm when it's ready to test.

***

### Step 4: Add Sumble to Your Okta Dashboard (Optional)

After SSO is configured by Sumble, you can allow users to launch Sumble directly from their Okta app dashboard:

1. In Okta Admin Console, go to the Sumble application settings
2. Under **General** > **Login**, set:
   * **Login initiated by**: Either Okta or App
   * **Initiate login URI**: Your Sumble Customer Success Manager will provide this URL after setup
3. Save the settings
4. Users will now see Sumble in their Okta app dashboard

***

### SSO Enforcement (Optional)

Once SSO has been successfully tested (at least one user must log in via Okta), you can optionally request that SSO be enforced for your organization. When enforcement is enabled:

* Google OAuth login is blocked for users on your domain and will redirect them to Okta
* Magic Link login is blocked for users on your domain
* All users must authenticate through Okta

To enable or disable SSO enforcement, contact your Sumble Customer Success Manager.

<a href="https://calendly.com/d/cnzk-sjk-q38/sumble" class="button primary">Book a time to chat with us</a>
