Configure Okta as an OIDC provider
Okta is a popular identity and access management platform that supports OpenID Connect (OIDC) for secure single sign-on. This guide will walk you through configuring Okta as an OIDC provider for Memberful.Create an Okta application
- Sign in to your Okta Admin Console.
- Navigate to Applications → Applications.
- Click Create App Integration.
- Select OIDC - OpenID Connect as the Sign-in method.
- Choose Web Application as the application type.
- Click Next.
Configure OIDC settings
In the General Settings section, configure the following:Application details
App integration name: Enter a descriptive name for your Memberful integration (e.g., “Memberful SSO”)Grant types
Make sure only the Authorization Code grant type is selected.Set up redirect URIs
In the Sign-in redirect URIs section, replace the placeholder URL with the following Memberful URL:Sign-out redirect URIs
Remove the provided placeholder Sign-out redirect URI, as Memberful doesn’t use it.Assignments
Select how you want to assign this application to your Okta users. Only assigned users will be able to sign-in to Memberful using Okta.Complete the integration
- Click Save to create your Okta application.
- Navigate to the General tab of your newly created application.
-
Copy the following values from the Client Credentials section:
- Client ID
- Client Secret
- Paste these values in the Memberful SSO form. Don’t share them with anyone else.
-
Enter your Okta account URL in the Memberful SSO form. It looks something like this:
your-account-domain.okta.com. - Save the Memberful form.
Security reminder: Keep your Client Secret secure and never share it publicly. If you suspect it’s been compromised, regenerate it in your Okta dashboard and update the configuration in Memberful.