Okta SSO
This integration enables seamless user authentication by leveraging OIDC-based single sign-on (SSO).
Prerequisites
Please note that this setup requires administrator access to your Okta organization. You will also need administrator access to your Paminga account to complete the configuration on the Paminga side.
Supported Features
The Okta/Paminga SSO integration currently supports the following features:
- SP-initiated SSO
For more information on the listed features, visit the Okta Glossary.
Configuration Steps
Login to Okta as a user with administrator privileges.
Configuring Okta to support Paminga
- Go to "Applications" and click "Create App Integration"
- Select "OIDC - OpenID Connect" as the sign-in method
- Select "Web Application" as the application type and click "Next"
- On the "General Settings" page, label the application per your company's preference
- Under "Sign-in redirect URIs", enter:
https://api.paminga.com/api/sso/okta/callback - Under "Assignments", configure access for the appropriate users or groups
- Click "Save" to complete the Okta setup
- Copy the Client ID and Client Secret from the application's "General" tab — you will need these for the Paminga setup
Configuring Paminga
- In Paminga, navigate to Settings > Account > Login Security Policy
- Under the Okta SSO section, enter the following:
- Okta Org URL — Your Okta organization URL (e.g.
https://mycompany.okta.com) - Client ID — The Client ID from step 8 above
- Client Secret — The Client Secret from step 8 above
- Okta Org URL — Your Okta organization URL (e.g.
- Click "Save" to complete the setup
SP-Initiated SSO Instructions
Once configured, users will see a "Sign in with Okta" option on the Paminga login page. Clicking it will redirect them to Okta for authentication and return them to Paminga upon successful login.
Troubleshooting
For any assistance, please reach out to your Account Manager or your Paminga point of contact.


