Skip to main content

Configure OIDC SSO between DigiCert and Okta

Use this procedure to configure Single Sign-On (SSO) between your DigiCert® account and Okta using OIDC.

You’ll need to complete setup in both DigiCert and Okta, and switch between the two tabs to exchange URLs and other information.

Once completed, users in your account will be able to sign in from the DigiCert sign-in page with their Okta credentials.

Note

For more information, refer to Okta Help Center.

Before you begin

You'll need elevated privileges in DigiCert account and Okta to configure SSO:

  • Account admin user group required in DigiCert account.

    How do I check my user group?

  • Application Administrator or equivalent role required in Okta.

Access DigiCert's OIDC configuration page:

  1. In the DigiCert​​®​​ account menu, select the Accounts icon > Sign-in methods.

  2. Select Single sign-on with OIDC.

  3. Keep this tab open.

In another tab, create an OIDC app for your DigiCert account:

  1. Sign in to your Okta Admin Console.

  2. Go to Applications > Applications.

  3. Select Create App integration:

  4. Select OIDC - OpenID Connect as the Sign-in method.

  5. Select Web application as the Application type.

  6. Select Next.

  7. Enter DigiCert​​®​​ account as the App integration name.

  8. Copy the following values from DigiCert and provide it in Okta:

    1. Copy the Redirect URI and paste it into the Sign-in redirect URIs field in Okta

    2. Copy the Logout URL and paste it into the Sign-out redirect URIs field.

  9. In the Assignments section, select Skip group assignments for now.

  10. Select Save.

  11. On the General tab in Okta, scroll down to the General Setting section, and select Edit.

    1. In the Login section, select Either Okta or App in the Login initiated by field.

    2. Copy the Login URL from DigiCert into the Initiate login URI field.

  12. Keep this tab open.

To complete the Connect your IdP to DigiCert section, source the following information from Okta:

  1. Go to the General tab > Client credentials in Okta:

    1. Copy the Client ID field and enter it in the following fields in DigiCert account:

      1. Client ID

      2. ID token audience

    2. In the Client secrets section in Okta, copy the Client secret and enter it into the in the Client secret field in DigiCert.

  2. To construct the Provider URL required in DigiCert account:

    1. From left menu, select Security > API.

    2. On the Authorization servers tab, copy the Issuer URL.

      Example: https://example.okta.com/oauth2/default

    3. Replace /oauth2/default in the Issuer URL with /.well-known/openid-configuration

  3. In DigiCert account:

    1. Enter the constructed URL in the Provider URL in DigiCert account.

      Example: https://example.okta.com/.well-known/openid-configuration

    2. In the Enable/Disable SSO with SAML section, switch to enable SSO.

    3. Select Save configuration.

Ensure that all users in your DigiCert account are assigned to the SAML application in Okta Admin dashboard:

  1. Go to Applications > Applications.

  2. Select DigiCert account app you created.

  3. Select the Assignments tab.

  4. Select Assign > Assign People.

  5. Next to the user's name, select Assign.

  6. Select Save and Go Back.

  7. Select Done.

Attempt to sign in to DigiCert account, using your Okta credentials:

  1. Sign in to DigiCert​​®​​ account.

  2. Provide your Okta username.

  3. Select Sign in with your company's SSO.

    Tip

    When 2FA is enabled, DigiCert skips the OTP prompt if you have already provided an OTP to your IdP.

    • Your SAML app is configured correctly if:

      • You use 2FA to access your IdP, and you’re automatically signed into DigiCert account.

      • You don't use 2FA to access your IdP, you’re redirected to DigiCert account and asked to complete two-factor authentication (2FA).

    • If you aren’t able to sign in with SSO, compare your app settings to these instructions or contact DigiCert Support for assistance.