Okta Setup
- Sign-in method: OIDC - OpenID Connect
- Application type: Web Application
- App integration name: Primalogik
- Sign-in redirect URIs: https://app.primalogik.com/360/oauth2callback
- Assignments: Select one as per your organization's policy
- You can leave the default values for everything else
- LOGIN - Login initiated by: Either Okta or App
- LOGIN - Application visibility: Select "Display application icon to users"
- Log in to Primalogik with a user having the Administrator privilege.
- In the left menu, under "Settings", click "Manage Account".
- Under "General", click "Integration".
- Click the Configure button in the Okta section.
- In the Okta domain field, enter you Okta subdomain. This is the part of the URL that comes before ".okta.com" when you are logged in to Okta.
- In the Client ID field, enter the value copied from the Client ID field of the Okta application created previously.
- In the Client secret field, enter the value copied from the Client Secrets field of the Okta application.
Signing in to Primalogik
To sign in to Primalogik through Okta SSO, users have these options:
- Click on the Primalogik app icon within Okta.
- Bookmark the "Initiate login URI".
- Access Primalogik though the links included in emails sent by the Primalogik app.
The third option above is very convenient for end-users. For example, when invited to respond to a Primalogik assessment, users receive an email including a link to Primalogik. That link includes a uuid that will allow them to automatically login through SSO and access the questionnaire page directly.
Even when Okta SSO is enabled, users can still login using a username and password, unless you have selected the option "Do not allow password based login" in the General Settings.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article