Resources

×

Visual CMS

Drag-and-drop visual editor and headless CMS for any tech stack

Theme Studio for Shopify

Build and optimize your Shopify-hosted storefront, no coding required

Resources

Blog

Get StartedLogin

☰

Home

Forum

Blog

Github

Login

Signup

Made in Builder


Single Sign-On with Okta

If your organization is using Okta as an identity provider, you can easily set up Single Sign-On (SSO) with either OIDC or SAML 2.0. This guide will walk you through both methods of integrating with Okta.

👉Tip: If you don't currently have an Enterprise account, you'll need to upgrade to get access to Single Sign-On. Please contact sales@builder.io for more information.

Adding Okta SSO via OIDC

The first step is to navigate to your applications page in Okta, the url should look something like: https://my-org-admin.okta.com/admin/apps/active

Click the "Add Application" button to create a new application. On the next screen, you'll want to click the "Create Application" button.

Creating the OIDC app in Okta

The first step is to navigate to your applications page in Okta, the url should look something like: https://my-org-admin.okta.com/admin/apps/active

Click the "Add Application" button to create a new application. On the next screen, you'll want to click the "Create Application" button. Make sure Web is selected in the dropdown, and select OpenID Connect as the Sign on method.

The next screen allows you to customize how the application will be displayed to users in your Okta dashboard. We suggest using a name like Builder.io and using this icon.

Login redirect URI: https://builder-3b0a2.firebaseapp.com/__/auth/handler


👉Important: In order for the integration to work correctly, you need to enable the Implicit OIDC flow by clicking the Edit button on the general settings page of the new application:

Once you have that configured, you'll need to make a note of the Client ID of the application, as well as your Okta Domain.

Adding the Okta integration to your Builder Org

Navigate to your organization settings in Builder. There should be a row in the settings table called Single Sign-On, if you do not see this entry, please contact us via the chat widget in the lower right of your screen.

After clicking the Edit icon, choose OpenID Connect from the top drop-down, give your integration a user-friendly display name and choose a Provider Id for the SSO Name field. You'll use this to sign into Builder via a url like https://builder.io/login/oidc/demo-org.

Lastly, enter the Client ID and Okta Domain in the Client ID and Issuer Url fields.

Testing the integration

Once you've saved the SSO integration, you can test the login flow via logging out and visiting https://builder.io/login/oidc/<your-sso-name>.

Note: you cannot use SSO if your browser doesn't support cookies so if you're in an incognito window ensure that cookies are enabled.

Adding Okta SSO via SAML 2.0

Detailed docs are coming soon!

Was this article helpful?