
App Integration Fixes The following SWA apps were not working correctly and are now fixedĭow Jones Private Equity and Venture (OKTA-388720)įederal Procurement Data System (OKTA-382991) In some cases when the new Okta End-User Dashboard was enabled, Okta incorrectly made hourly token renewal requests that caused user sessions to be active longer than configured.
#Extrinsic vs intrinsic motivation conclusion how to
Koopid AI: For configuration information, see How To Setup Okta Single Sign-On Integration.

Impero: For configuration information, see How do I use Okta to log in to Impero? Sisense for Cloud Data Teams: For configuration information, see Sisense SCIM documentation.Ĭlozd: For configuration information, see Configure OIDC for authentication with Okta. New Integrations New SCIM Integration Application Hip For Business: For configuration information, see the Hip Okta Configuration Guide. WordPress SSO with SCIM Provisioning: For configuration information, see Okta User Provisioning Into WordPress Using SCIM Standard.Īuthress: For configuration information, see the Authress Okta integration guide. Icertis Contract Intelligence App: For configuration information, see Configuration Guide for SCIM Integration. New Integrations New SCIM Integration Applications The following SWA integrations are deprecated from the OIN: Sheetgo: For configuration information, see the Sheetgo Okta configuration guide. ReeferConnect: For configuration information, see ORBCOMM ReeferConnect Okta Configuration Guide. Noticeable: For configuration information, see Configuring Okta Single Sign-On with OpenID Connect. ICI App: For configuration information, see ICI OKTA OIDC App Configuration Guide for OIDC. SAML for the following Okta Verified applicationsĪxway - AMPLIFY Platform: For configuration information, see Configuring an OpenID Connect (OIDC) IdP. Qualified: For configuration information, see Provisioning Okta SSO Users. United Health Care Member Login (OKTA-390993)Ĭalendly: For configuration information, see How to set up SCIM on Okta. Ticketmaster Account Manager (OKTA-390224) Smart technology group: For configuration information, see smart technology group and Okta OIDC Integration.Īpp Integration Fixes The following SWA apps were not working correctly and are now fixed ReputationDefender: For configuration information, see OIDC Configuration Guide for Okta. QFlow.ai: For configuration information, see How does your Okta Integration work (you need a QFlow.ai account to access this documentation). OIDC for the following Okta Verified applications SWA for the following Okta Verified applications Squarespace: For configuration information, see Logging in with single sign-on through Okta (Enterprise).SkillsHood: For configuration information, see How to Configure Provisioning for SkillsHood.Redprint: For configuration information, see User Provisioning with Okta.PowerDMS: For configuration information, see Configuring Provisioning for PowerDMS.The following partner-built provisioning integration apps are now Generally Available in the OIN as partner-built: Migration use cases when customers migrate from the Okta domain to a custom domainĪpplications New Integrations New SCIM Integration Applications With Dynamic Issuer Mode, the issuer value in minted tokens is dynamically updated based on the URL that is used to initiate the original authorize request.įor example, if the authorize request is, the issuer value is. When there are applications that use Okta’s subdomain and other applications that use the custom domain, the issuer validation breaks because the value is hard-coded to one domain or the other. You can configure the issuer URL to be either the Okta subdomain (such as ) or a custom domain (such as ). WordPress OAuth Single Sign-On (SSO) by miniOrange: For configuration information, see Okta Single Sign-On (SSO) WordPress OAuth| Okta SSO Login.Īn authorization server’s issuer URL can be used to validate whether tokens are issued by the correct authorization server. Sonarapp: For configuration information, see Okta Single Sign-On configuration guide.

OIDC for the following Okta Verified applications:ĪIB Inc: For configuration information, see How do I use Okta to log in to AIB?įortifyData: For configuration information, see FortifyData documentation here (you'll need a FortifyData account).


Customers should use the American Express - Work integration. The American Express Work was a duplicate integration and has been removed from the OIN Catalog. The configuration guide for the Vable SCIM integration is updated: Okta Users Provisioning For The Vable Platform.
