Environment: Production Purpose: Configure Okta as an OpenID Connect (OIDC) Identity Provider for Auth0
Auth0 Callback URI: https://auth.npi-digital.com/login/callback
Auth0 Sign-out Redirect URI: https://auth.npi-digital.com/logout
1. Prerequisites
Before starting, verify:
- You have Admin access to your Okta tenant.
You know your Auth0 production URLs:
- Callback:
https://auth.npi-digital.com/login/callback - Sign-out redirect:
https://auth.npi-digital.com/logout
- Callback:
- This integration will use OIDC (OpenID Connect), not SAML.
2. Create the Okta Application
- Log into your Okta Admin Console.
- Navigate to: Applications → Applications
- Click Create App Integration.
When prompted:
- Sign-in method: Select OIDC – OpenID Connect
- Application type: Select Web Application
- Click Next
3. Configure Application Settings
3.1 General Settings
Fill in the following:
App Integration Name: Example:
Auth0 Enterprise SSO - Prod(Optional) Add a description like: “Enterprise Single Sign-On app used by Auth0 for NPI Digital production environment.”
3.2 Sign-in Redirect URI (Callback URI)
In the Sign-in redirect URIs field, add:
https://auth.npi-digital.com/login/callback
This is where Okta sends the user after successful authentication.
⚠️ This must match exactly what’s configured in Auth0.
3.3 Sign-out Redirect URI
In the Sign-out redirect URIs field, add:
https://auth.npi-digital.com/logout
This is where users will be redirected after logging out via Auth0.
3.4 Assignments
Choose how users will be allowed to authenticate:
- Option 1 (common for production): Limit to selected groups
- Option 2: Allow everyone in your organization to access
Select based on your organization’s security policy.
3.5 Grants (Scopes)
Ensure at minimum these OpenID scopes are allowed:
openidprofileemail
These are necessary for identity and user data mapping in Auth0.
4. Saving and Collecting Required Values
After clicking Save, go to the application’s General tab and collect the following values:
4.1 Okta Domain
Your Okta domain will look like one of these:
https://yourcompany.okta.comhttps://yourcompany.oktapreview.com- Or a custom domain like
https://login.yourcompany.com
You will provide this to your Auth0 administrator.
4.2 Client Credentials
Navigate to the Client Credentials section of your application and copy:
- ✅ Client ID
- ✅ Client Secret
These are required in Auth0 to complete the enterprise connection.
Store these securely.
5. Token Configuration (Optional but Recommended)
To ensure proper claims are passed to Auth0, verify:
- Go to Security → API → Authorization Servers → Default
Check that:
emailnamepreferred_username- (Optional) group attributes are included in tokens
If you need groups in Auth0:
- Add a custom claim that includes group membership.
6. Test Users or Group Assignment
Confirm test users or user groups are assigned to this application:
- Go to the app’s Assignments tab.
- Assign test users or test groups.
- Save changes.
This ensures those users can authenticate during testing.
7. Final Deliverables for the Auth0 Team
Once complete, provide the following to your Auth0 administrator:
| Value | Example |
|---|---|
| Okta Domain | https://company.okta.com |
| Client ID | 0oa1abc123XYZ |
| Client Secret | ************ |
| Redirect URI | https://auth.npi-digital.com/login/callback |
| Logout URI | https://auth.npi-digital.com/logout |
8. Common Errors to Avoid
| Issue | Resolution |
|---|---|
"invalid_redirect_uri" | Ensure the callback URL matches Auth0 exactly |
| Missing email in Auth0 | Ensure email scope is enabled |
| Users can’t log in | Check the user/group assignments |
| Logout redirect fails | Make sure logout URI is registered in Okta |
9. Quick Checklist
- [ ] Created OIDC Web App in Okta
- [ ] Callback URL configured
- [ ] Logout redirect URL configured
- [ ] App assigned to correct users/groups
- [ ] Client ID & Secret copied
- [ ] Okta domain confirmed
- [ ] Token scopes and claims verified
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article