OKTA OpenID Integration

StatusCast allows you to utilize the OpenID feature built into Okta so that your administrators and users don’t need to manage multiple passwords.

OKTA App Setup

To start, login to OKTA with an administrative user and navigate to the Applications section.

  1. Click the Create App Integration button.
651
  1. Select OIDC - OpenID Connect.
  2. Select Web Application. Click Next.

  1. Edit the Following fields:
    App integration name - Choose a name for your OpenID connection
    Sign-in redirect URIs USE - https://status.statuscast.com/authentication/openid

  1. Choose who you would like to provide access via OpenID in your organization.

  1. Click Save.
  • Return to the top of the page and Copy the Client ID and Client Secret to a secure location.

Identity Provider Setup

  1. Navigate to the Security > Identity Provider section.
  2. Click Add Identity Provider
  3. Select OpenID

  1. Fill out the following fields:
  • Name
  • Scopes -*The minimum scope needed to be added is openid

  • Client ID -Paste the client ID that you obtained from the OKTA App
  • Client Secret -Paste the secret that you obtained from the OKTA App

Installing the SSO Integration

On the Admin page of in StatusCast, Navigate to Settings > Integrations. Find OpenID and click Install.

1092
  1. Choose a Role to configure.
  2. Fill out the following fields:
1004

3.Click Install/Save

Signing In

Now you’re OpenID integration is complete and the users you granted access to can sign into StatusCast using their SSO credentials.

The URL paths for each of the roles are listed below:

Subscriber > https://[yourapp].status.page/login
Employee > https://[yourapp].status.page/login/employee
Manager > https://[yourapp].status.page/login/manager
Administrator > https://[yourapp].status.page/login/admin
Company Administrator > https://[yourapp].status.page/login/companyadmin