Skip to main content

Configure Okta as an OIDC provider

Okta is a popular identity and access management platform that supports OpenID Connect (OIDC) for secure single sign-on. This guide will walk you through configuring Okta as an OIDC provider for Memberful.

Create an Okta application

  1. Sign in to your Okta Admin Console.
  2. Navigate to ApplicationsApplications.
  3. Click Create App Integration.
  4. Select OIDC - OpenID Connect as the Sign-in method.
  5. Choose Web Application as the application type.
  6. Click Next.

Configure OIDC settings

In the General Settings section, configure the following:

Application details

App integration name: Enter a descriptive name for your Memberful integration (e.g., “Memberful SSO”)

Grant types

Make sure only the Authorization Code grant type is selected.

Set up redirect URIs

In the Sign-in redirect URIs section, replace the placeholder URL with the following Memberful URL:
https://auth.memberful.com/admin/okta/redirect

Sign-out redirect URIs

Remove the provided placeholder Sign-out redirect URI, as Memberful doesn’t use it.

Assignments

Select how you want to assign this application to your Okta users. Only assigned users will be able to sign-in to Memberful using Okta.

Complete the integration

  1. Click Save to create your Okta application.
  2. Navigate to the General tab of your newly created application.
  3. Copy the following values from the Client Credentials section:
    • Client ID
    • Client Secret
  4. Paste these values in the Memberful SSO form. Don’t share them with anyone else.
  5. Enter your Okta account URL in the Memberful SSO form. It looks something like this: your-account-domain.okta.com.
  6. Save the Memberful form.
Security reminder: Keep your Client Secret secure and never share it publicly. If you suspect it’s been compromised, regenerate it in your Okta dashboard and update the configuration in Memberful.