SSO for Okta

This page walks you through the steps to configure Zus SSO if your organization uses Okta as your IDP.

📘

Before you begin

  • As a requirement for configuring Zus SSO, customers must attest that multi-factor authentication is required for all users and included in their identity provider's authentication workflow when accessing the Zus domain.
  • Only customer users with corresponding Zus auth accounts will be accepted for SSO login.

Configuring SSO

  1. Go to the Okta admin console.
  2. Under Applications -> Applications -> click Create App Integration. Select OIDC and Web Application.

  1. Create a name for the app (e.g. “zus-sandbox”), and set the Sign-In Redirect URI as follows:
    1. Sandbox: auth.sandbox.zusapi.com/login/callback
    2. Production: auth.zusapi.com/login/callback


  1. Once you save this page, your Client ID and Client Secret will be created for you
  2. Share the Client ID and secret with Zus via a secure channel, along with your Okta domain (e.g. “acme.okta.com”)