Articles on: Integrations

Okta SSO Configuration Guide

Before configuring OIDC SSO integration with Okta, ensure the following requirements are met:


  • meetergo Plan: Teams plan or higher with SSO addon purchased
  • Okta Access: Admin access to your Okta organization to create OIDC applications
  • Email Domain: A verified email domain that will be used to identify your organization during SSO


Supported Features


  • SP-initiated SSO (Single Sign-On)
  • Just-In-Time provisioning
  • OIDC (OpenID Connect) authentication

For more information on the listed features, visit the Okta Glossary.


Configuration Steps


Step 1: Create OIDC Application in Okta


  1. In your Okta Admin Console, go to Applications > Applications
  2. Click Create App Integration
  3. Select OIDC - OpenID Connect as the Sign-in method
  4. Choose Web Application as the Application type
  5. Configure the following settings:
  1. Click Save
  2. Note the Client ID and Client Secret from the application details


Step 2: Request SSO Configuration from meetergo


  1. Contact meetergo support at richard@crisp.meetergo.com
  2. Include the following information in your request:
    • Subject: "OIDC SSO Setup Request for [Your Organization Name]"
    • Organization Name: Your company name
    • Email Domain: The email domain for your users (e.g., yourcompany.com)
    • Okta Domain: Your Okta organization domain (e.g., yourcompany.okta.com)
    • Client ID: From Step 1
    • Client Secret: From Step 1
    • Primary Contact: Admin contact for coordination


Step 3: Confirmation and Testing


  1. meetergo support will configure SSO for your organization (typically within 1 business day)
  2. You'll receive confirmation when SSO is enabled
  3. Test the configuration by following the SP-initiated SSO process below


SP-initiated SSO


The sign-in process is initiated from meetergo.

  1. Navigate to my.meetergo.com/login
  2. Click "Sign in with SSO"
  3. Enter your email address (must use your organization's configured domain)
  4. You'll be redirected to your Okta login page
  5. Enter your Okta credentials
  6. If authentication is successful, you'll be redirected to the meetergo dashboard


User Attribute Mapping


The following user attributes are automatically mapped from Okta to meetergo during authentication:


meetergo Attribute

Okta Claim

Email

email

First Name

given_name

Last Name

family_name

Note


  • Only users with email addresses matching your configured domain can use SSO
  • Users are automatically provisioned in meetergo on their first successful SSO login
  • SSO must be enabled for your organization before users can authenticate
  • Regular username/password authentication remains available alongside SSO


Troubleshooting


Common Issues


Issue: "SSO not configured for this domain" error Solution: Verify that your email domain matches exactly what was provided to meetergo support

Issue: Redirect loop or authentication errors Solution:

Issue: User attributes not mapping correctly Solution: Ensure your Okta user profiles include the required fields: email, given_name, family_name


Support Contact


For technical support or configuration assistance:


This guide is designed for meetergo customers using Okta as their identity provider. For other identity provider configurations, contact meetergo support.

Updated on: 21/11/2025

Was this article helpful?

Share your feedback

Cancel

Thank you!