meetergomeetergo Help

Okta SSO Configuration Guide

Updated on November 21, 2025

Before configuring OIDC SSO integration with Okta, ensure the following requirements are met:

  • meetergo Plan: Teams plan or higher with SSO addon purchased
  • Okta Access: Admin access to your Okta organization to create OIDC applications
  • Email Domain: A verified email domain that will be used to identify your organization during SSO

Supported Features

  • SP-initiated SSO (Single Sign-On)
  • Just-In-Time provisioning
  • OIDC (OpenID Connect) authentication For more information on the listed features, visit the Okta Glossary.

Configuration Steps

Step 1: Create OIDC Application in Okta

  1. In your Okta Admin Console, go to Applications > Applications
  2. Click Create App Integration
  3. Select OIDC - OpenID Connect as the Sign-in method
  4. Choose Web Application as the Application type
  5. Configure the following settings:
    • App integration name: meetergo
    • Grant type: Select Authorization Code
    • Sign-in redirect URIs: https://auth.meetergo.com/oauth2/idpresponse
    • Sign-out redirect URIs: https://my.meetergo.com/login (optional)
    • Controlled access: Assign to appropriate users or groups
  6. Click Save
  7. Note the Client ID and Client Secret from the application details

Step 2: Request SSO Configuration from meetergo

  1. Contact meetergo support at richard@crisp.meetergo.com
  2. Include the following information in your request:
    • Subject: "OIDC SSO Setup Request for [Your Organization Name]"
    • Organization Name: Your company name
    • Email Domain: The email domain for your users (e.g., yourcompany.com)
    • Okta Domain: Your Okta organization domain (e.g., yourcompany.okta.com)
    • Client ID: From Step 1
    • Client Secret: From Step 1
    • Primary Contact: Admin contact for coordination

Step 3: Confirmation and Testing

  1. meetergo support will configure SSO for your organization (typically within 1 business day)
  2. You'll receive confirmation when SSO is enabled
  3. Test the configuration by following the SP-initiated SSO process below

SP-initiated SSO

The sign-in process is initiated from meetergo.

  1. Navigate to my.meetergo.com/login
  2. Click "Sign in with SSO"
  3. Enter your email address (must use your organization's configured domain)
  4. You'll be redirected to your Okta login page
  5. Enter your Okta credentials
  6. If authentication is successful, you'll be redirected to the meetergo dashboard

User Attribute Mapping

The following user attributes are automatically mapped from Okta to meetergo during authentication:

| meetergo Attribute | Okta Claim | | ---- | | Email | email | | First Name | given_name | | Last Name | family_name |

Note

  • Only users with email addresses matching your configured domain can use SSO
  • Users are automatically provisioned in meetergo on their first successful SSO login
  • SSO must be enabled for your organization before users can authenticate
  • Regular username/password authentication remains available alongside SSO

Troubleshooting

Common Issues

Issue: "SSO not configured for this domain" error Solution: Verify that your email domain matches exactly what was provided to meetergo support Issue: Redirect loop or authentication errors Solution:

  • Verify the Client ID and Client Secret are correct in both Okta and meetergo
  • Check that the redirect URI in Okta exactly matches: https://auth.meetergo.com/oauth2/idpresponse Issue: User attributes not mapping correctly Solution: Ensure your Okta user profiles include the required fields: email, given_name, family_name

Support Contact

For technical support or configuration assistance:

This guide is designed for meetergo customers using Okta as their identity provider. For other identity provider configurations, contact meetergo support.

Was this article helpful?

Let us know if this article answered your questions.