Before you begin
These steps must be completed by your Okta and GovDash admin, as we will require the administrator to configure Okta sign in capabilities through the Okta Admin Console and GovDash Authentication Settings.
Setup
Log into your Okta Admin Console.
Navigate to Applications → Create App Integration.
Select OIDC - OpenID Connect as the sign-on method.
Set Application Type to Web Application. Click Next.
Configure the new Application
Ensure Authorization Code is checked in Core grants.
Sign-in redirect URIs: https://dashboard.govdash.com/auth/okta/callback
Under Assignments, choose whether you want all of your users to be able to access GovDash or only specific users or groups. GovDash still requires users to be invited to your GovDash team, but you can also limit access to certain users or groups through your IdP.
Configure other settings as needed, then click Save. Ensure you record your Client ID and Client Secret, as these are needed for the GovDash setup step.
Navigate to GovDash Authentication settings: https://dashboard.govdash.com/settings/authentication
Enter your Client ID, Client Secret, and Okta Domain in the fields under Okta Tenant Information.
Click Update to complete the setup.
Signing in with Okta
After completing setup, users can navigate to the GovDash login page. After entering their email from the login page, they can click Sign in with Okta to sign in using the configured settings.