- Only Admins can use this feature
You can configure SSO on your own, depending on the identity provider your company uses and which protocol you would like to use.
TravelPerk provides self-setup for Azure, G Suite and OneLogin using OAuth. The rest of the identity providers will be configured using SAML.
Setting up a new application on your Okta account
- Go to the Admin Dashboard, click Applications
- Choose Applications
- Click Add Application
- Click Create New App
- On the Create a New Application pop-up, select OpenID Connect as Sign on method
- Click Create
- Enter the Application name as TravelPerk, you can add an Application Logo
- Under Login redirect URIs, copy the login redirect URI from TravelPerk and paste it here
- Click Save - this will create a new Client ID and Client secret that you need to copy into the TravelPerk integration
Note: Make sure users have access to this new application. Go to the Assignments tab and give access to the right People and Groups.
Setting up the new SSO integration in your TravelPerk account
- Go to Account Settings
- Select Integrations
- Find the SSO integration and click Set up
- Click Okta OAuth2 button
- Copy the Client ID and Client secret from Okta and paste them on the SSO setup on TravelPerk
- Enter your company subdomain and click Authenticate
- Sign in using your Okta credentials
- Your account is linked and you'll be taken to the TravelPerk SSO settings page where you can Customize your SSO settings
Tip: You can create, manage, edit, or delete users automatically from Okta. Follow these guidelines for more information.
You might also be interested in: