Skip to content

Okta OIDC Setup

This guide walks you through creating an Okta OIDC application and connecting it to Oore CI.

What you need

  • An Okta account with admin access
  • Permission to create applications in your Okta organization
  • Your Oore CI instance ready for setup

1. Create an OIDC application

  1. Sign in to the Okta Admin Console
  2. Go to Applications > Applications
  3. Click Create App Integration
  4. Select OIDC - OpenID Connect and Web Application
  5. Click Next

2. Configure the application

FieldValue
App integration nameOore CI
Grant typeAuthorization Code
Sign-in redirect URIshttp://127.0.0.1:4173/auth/callback, http://localhost:3000/auth/callback, https://ci.oore.build/auth/callback
Sign-out redirect URIshttp://127.0.0.1:4173, http://localhost:3000
Controlled accessChoose your access policy

Both setup and regular sign-in use the same /auth/callback path — you only need one URI per origin. For a custom domain, replace the hosted UI URI with yours.

Click Save.

3. Copy credentials

From the application's General tab, copy:

  • Client ID
  • Client secret

4. Find the issuer URL

Your Okta issuer URL follows this pattern:

https://{your-okta-domain}/oauth2/default

For example: https://dev-123456.okta.com/oauth2/default

Verify it supports OIDC discovery:

bash
curl https://dev-123456.okta.com/oauth2/default/.well-known/openid-configuration | jq .issuer

5. Enter credentials in Oore CI

During setup, enter:

FieldValue
Issuer URLhttps://{your-okta-domain}/oauth2/default
Client IDFrom step 3
Client secretFrom step 3

Troubleshooting

"Redirect URI mismatch"

Ensure the redirect URIs in Okta exactly match what Oore CI sends. Check for trailing slashes and http vs https.

"OIDC discovery failed"

Verify the issuer URL includes /oauth2/default (or your custom authorization server path).

Reference

Self-hosted mobile CI, built for Flutter.