Okta SSO Configuration Guide
Before configuring OIDC SSO integration with Okta, ensure the following requirements are met:
- meetergo Plan: Teams plan or higher with SSO addon purchased
- Okta Access: Admin access to your Okta organization to create OIDC applications
- Email Domain: A verified email domain that will be used to identify your organization during SSO
Supported Features
- SP-initiated SSO (Single Sign-On)
- Just-In-Time provisioning
- OIDC (OpenID Connect) authentication
For more information on the listed features, visit the Okta Glossary.
Configuration Steps
Step 1: Create OIDC Application in Okta
- In your Okta Admin Console, go to Applications > Applications
- Click Create App Integration
- Select OIDC - OpenID Connect as the Sign-in method
- Choose Web Application as the Application type
- Configure the following settings:
- App integration name:
meetergo - Grant type: Select Authorization Code
- Sign-in redirect URIs:
https://auth.meetergo.com/oauth2/idpresponse - Sign-out redirect URIs:
https://my.meetergo.com/login(optional) - Controlled access: Assign to appropriate users or groups
- App integration name:
- Click Save
- Note the Client ID and Client Secret from the application details
Step 2: Request SSO Configuration from meetergo
- Contact meetergo support at richard@crisp.meetergo.com
- Include the following information in your request:
- Subject: "OIDC SSO Setup Request for [Your Organization Name]"
- Organization Name: Your company name
- Email Domain: The email domain for your users (e.g.,
yourcompany.com) - Okta Domain: Your Okta organization domain (e.g.,
yourcompany.okta.com) - Client ID: From Step 1
- Client Secret: From Step 1
- Primary Contact: Admin contact for coordination
Step 3: Confirmation and Testing
- meetergo support will configure SSO for your organization (typically within 1 business day)
- You'll receive confirmation when SSO is enabled
- Test the configuration by following the SP-initiated SSO process below
SP-initiated SSO
The sign-in process is initiated from meetergo.
- Navigate to my.meetergo.com/login
- Click "Sign in with SSO"
- Enter your email address (must use your organization's configured domain)
- You'll be redirected to your Okta login page
- Enter your Okta credentials
- If authentication is successful, you'll be redirected to the meetergo dashboard
User Attribute Mapping
The following user attributes are automatically mapped from Okta to meetergo during authentication:
meetergo Attribute | Okta Claim |
|---|---|
First Name | given_name |
Last Name | family_name |
Note
- Only users with email addresses matching your configured domain can use SSO
- Users are automatically provisioned in meetergo on their first successful SSO login
- SSO must be enabled for your organization before users can authenticate
- Regular username/password authentication remains available alongside SSO
Troubleshooting
Common Issues
Issue: "SSO not configured for this domain" error Solution: Verify that your email domain matches exactly what was provided to meetergo support
Issue: Redirect loop or authentication errors Solution:
- Verify the Client ID and Client Secret are correct in both Okta and meetergo
- Check that the redirect URI in Okta exactly matches:
https://auth.meetergo.com/oauth2/idpresponse
Issue: User attributes not mapping correctly Solution: Ensure your Okta user profiles include the required fields: email, given_name, family_name
Support Contact
For technical support or configuration assistance:
- Email: richard@crisp.meetergo.com
- Include: Your organization name, domain, and detailed description of the issue
This guide is designed for meetergo customers using Okta as their identity provider. For other identity provider configurations, contact meetergo support.
Updated on: 21/11/2025
Thank you!
