Skip to main content
Okta supports both OIDC and SAML. OIDC is simpler and is the default path we recommend. Before you start, grab your OIDC Redirect URL (for OIDC) or your SAML ACS URL and SAML Entity ID (for SAML) from the Endpoints for your IdP card on the Quippy admin portal’s SSO page.

1. In Okta

2. In Quippy

Back in the admin portal’s SSO page, paste the values you just collected.
Quippy fieldValue from Okta
Issuer URLhttps://<your-domain>.okta.com/oauth2/default
Client IDApp → General → Client ID
Client SecretApp → General → Client secret

3. Test connection

Click Test connection in the Quippy admin portal.
  • OIDC success — the test returns the authorization_endpoint, token_endpoint, jwks_uri, and whether PKCE is supported.
  • SAML success — the test confirms the entry point is reachable and responds with SAML metadata.
Then enable SSO — but keep a backup admin until your first SSO sign-in succeeds.

Common gotchas

Okta has a default authorization server and may have custom ones. The issuer URL you paste into Quippy must match the one Okta uses to sign tokens. For most tenants it’s https://<domain>.okta.com/oauth2/default. If you created a custom server, the path will differ.
Okta will return a valid sign-in session but fail the app authorization step. Assign the user or their group to the Quippy app under Assignments.
Strip any leading/trailing whitespace and make sure the PEM includes the full -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- lines.