Okta
Available in v1.21.6+This feature is only available for ScaleOps Cloud users.
Okta Configuration
-
Create a Web Application: In your Okta Admin Console, go to Applications and click on
Create App Integration.
-
Select
Create App Integration, and create a new Web application with OIDC Sign-in.
-
Under Sign-in redirect URIs, add the following URL:
https://auth.scaleops.com/login/callback
-
Allow grant type
Refresh token.
-
Save the configuration and note the
Client ID,Client SecretandIssuer URLfor the ScaleOps configuration.

ScaleOps Configuration
- In the ScaleOps Cloud dashboard, go to
Users>Configure SSO:
- Select
Oktaas the provider, and fill the form.
- Save Configuration
Groups Setup (Optional)
If you need to retrieve both Active Directory groups and Okta-native groups in your OpenID Connect claims, see Okta’s documentation .
This allows you to automatically assign ScaleOps roles based on your existing Okta groups, streamlining user management and permissions.
-
In the Okta Admin Console, go to
Applications>Applications>ScaleOps>Sign Ontab, and configure your groups claim (whereScaleOpsis the name of the application we created in the first step).
-
In the ScaleOps Cloud dashboard, go to Users > Configure SSO > Okta, and configure the groups claim, by adding the groups claim to the
Groups Claimfield and theScopesfield.
Validation
- Log out from ScaleOps Cloud

- Login using
Continue with SSObutton.