Connecting Okta to Mobb
Last updated
Was this helpful?
Last updated
Was this helpful?
This guide explains how to integrate your organization’s Okta identity provider with Mobb. This allows your users to seamlessly sign in to Mobb using Okta SSO (Single Sign-On).
Sign in to your Okta Admin Console.
Navigate to Applications > Applications.
Click Create App Integration.
For Sign-in method, select OIDC - OpenID Connect.
For Application type, choose Web Application.
Click Next.
App Name:
Enter a descriptive name such as Mobb Okta Workspace
.
Sign-in redirect URIs:
Sign-out redirect URIs:
Assignments: Define which users or groups can access the app. You may assign all users or select specific groups.
Click Save.
Ensure the following API scopes are enabled in your Okta environment:
okta.apps.manage
okta.apps.read
okta.groups.read
okta.idps.read
okta.users.read
These permissions may be configured under: Security > API > Trusted Origins or Access Policies, depending on your Okta setup.
In your Okta application, collect the following information:
Client ID
Client Secret
Okta Domain
(e.g., dev-123456.okta.com
)
Company Email Domain(s)
(e.g., @yourcompany.com
)
This information can be found in the application, underneath the General tab:
Okta SSO Onboarding
Please include the Client ID, Client Secret, Okta Domain and Company Email Domains collected earlier.
This information allows Mobb to link your Okta environment to your users' email addresses and route authentication requests correctly.
Open a ticket at the with the subject:
We will reach out to you to confirm once Okta is fully ready to go. Once confirmed, you can start .