Skip to main content

Okta SSO

Set up Okta as your identity provider for Webrix.

Prerequisites

  • An active Okta account with administrative privileges
  • A Webrix account with administrative access

Supported features

SSO Features

  • SP-initiated SSO

SCIM Features

  • Import Users
  • Create Users
  • Update User Attributes
  • Deactivate Users
  • Group Push

Configuration steps

Add Webrix integration

  1. Sign in to your Okta Admin Console at https://{your-org}-admin.okta.com/admin/apps/add-app
  2. Navigate to ApplicationsBrowse App Catalog
  3. Search for Webrix in the search bar
  4. Click + Add Integration
  5. Fill in the application details:
    • Application label: Enter a name for your app (recommended: "Webrix")
    • Webrix Admin URL:
      • For SaaS deployments: app.webrix.ai
      • For On-Premise deployments: Your APP_URL (for example, webrix-admin.your-domain.com)
    • Webrix Dashboard URL:
      • For SaaS deployments: {your-webrix-org}.mcp-s.com
      • For On-Premise deployments: Your CONNECT_URL (for example, webrix-dashboard.your-domain.com)
  6. Click Done

Configure SSO

  1. In the Webrix app on Okta, navigate to the Sign On tab
  2. Click Edit in the OpenID Connect ID Token section
  3. Under Credentials Details, set Application username format to Email
  4. Click Save
  5. Copy the Client ID and Client secret values
  6. Open a new browser tab and go to your Webrix Admin Console at https://app.webrix.ai/admin/settings
  7. Navigate to SettingsAuthentication
  8. Select Provider: Okta from the dropdown
  9. Enter the following values:
    • Client ID: Paste the Client ID from step 5
    • Client Secret: Paste the Client secret from step 5
    • Issuer: Your Okta domain URL (for example, https://acme-corp.okta.com)
  10. Click Save Changes

Configure Okta in Webrix

Your SSO configuration is now complete.

Assign users or groups

  1. Return to the Okta Admin Console
  2. In the Webrix app, navigate to the Assignments tab
  3. Click Assign and select Assign to People or Assign to Groups
  4. Select the users or groups who should have access to Webrix
  5. Click Assign and then Done

Add users to Webrix

  1. Go to https://app.webrix.ai/manage/users Users
  2. Click Add User
  3. Enter the user's name and email
  4. Click Create

SP-initiated SSO

Users can sign in to Webrix by starting from the Webrix dashboard:

  1. Navigate to your Webrix dashboard at https://{your-webrix-org}.mcp-s.com
  2. You'll be automatically redirected to Okta to authenticate
  3. Enter your Okta credentials (if not already signed in to Okta)
  4. After successful authentication, you'll be redirected back to the Webrix dashboard

Configure SCIM provisioning

If you want to automatically provision and manage users from Okta to Webrix, follow these steps:

  1. In your Webrix Admin Console, navigate to https://app.webrix.ai/admin/api-tokens
  2. Click Generate Token

Generate API Token in Webrix

  1. Enter a descriptive name for the token (for example, "Okta SCIM")

  2. Click Generate

  3. Copy the API Token (it starts with wxt_...)

    Important: Save this token securely. You won't be able to see it again.

  4. Return to the Okta Admin Console

  5. In the Webrix app, navigate to the Provisioning tab

  6. Click Configure API Integration

  7. Check the Enable API integration checkbox

  8. Paste the API token from step 5 into the API Token field

  9. Click Test API Credentials to verify the connection

  10. Click Save

  11. Navigate to ProvisioningTo AppEdit

  12. Enable the following features:

    • Create Users: Automatically create new users in Webrix when assigned in Okta
    • Update User Attributes: Sync user attribute changes from Okta to Webrix
    • Deactivate Users: Automatically deactivate users in Webrix when unassigned in Okta
  13. Click Save

Your SCIM provisioning is now configured.

Contact support

If you continue to experience issues, contact Webrix support at [email protected] with the following information:

  • Your Okta organization domain
  • The error message or behavior you're experiencing
  • Screenshots of your configuration (with sensitive information redacted)