Use Okta with Limio for Customers

Introduction

This guide provides step-by-step instructions for integrating Okta with Limio for authentication purposes. By completing this setup, you can enhance your system's security and streamline user authentication. This guide assumes you have admin-level access to both Okta and Limio.

Note this is for your end-users or customers, aiming to logging to manage their subscriptions. Learn more at .


Prerequisites

Before you begin, ensure you have the following:

  • Admin access to your Okta Developer Console.

  • Access to the Limio platform with appropriate permissions to modify authentication settings.

  • The following information prepared:

    • Your Okta domain.

    • Redirect URIs required for Limio.


Okta Configuration

  1. Access Your Okta Developer Console

    • Log in to .

  2. Create a New Application

    • Navigate to Applications > Applications > Create App Integration.

    • Choose OIDC - OpenID Connect as the sign-in method.

    • Select Web Application and click Next.

  3. Set Up Application Settings

    • Configure the following:

      • Sign-in redirect URIs: https://{tenant}-shop.prod.limio.com/api/sf

      • Sign-out redirect URIs: https://{tenant}-shop.prod.limio.com/api/sf/logout

    • Click Save to complete the setup.

  4. Retrieve Integration Credentials

    • Note down the following:

      • Client ID

      • Client Secret

      • Issuer URL (e.g., https://{okta-domain}/oauth2/default)


Limio Configuration

  1. Access Limio Authentication Settings

    • Log in to Limio and navigate to Settings > Authentication > OpenID Connect.

  2. Add a New Authentication Provider

    • Configure the following:

      • Provider Name: A unique name to identify the provider, e.g., okta-test-dev-shop.prod.limio.com.

      • Issuer Name: The Issuer URL from Okta.

      • Client ID: As provided by Okta.

      • Client Secret: As provided by Okta.

      • JWKS URI: https://{okta-domain}/oauth2/default/v1/keys

      • Authorization Endpoint: https://{okta-domain}/oauth2/default/v1/authorize

      • Token Endpoint: https://{okta-domain}/oauth2/default/v1/token

      • Logout Endpoint: https://{okta-domain}/oauth2/default/v1/logout

      • Token Endpoint Type: Basic

      • Scope: openid profile email

  3. Save and Test the Configuration

    • Save the changes and test the authentication flow to ensure proper integration.

Conclusion

You have now configured Okta as an authentication provider for Limio. For further assistance or troubleshooting, refer to the or contact Limio Support.

Last updated

Was this helpful?