Okta Identity Cloud Service

Using Okta as an OpenID Connect identity provider is similar to using it as an OAuth provider, but OpenConnect ID has additional features specific to identity and access management. You can find more information on the OAuth 2.0 and OpenID Connect overview page.

Okta Identity Cloud Service can be integrated with Rocket.Chat via its OpenID Connect support. This guide walks you through a basic example setup.

Create a custom OAuth method

In your Rocket.Chat workspace, follow these steps:

  1. Go to Administration > Settings > OAuth.

  2. Click Add Custom OAuth.

  3. Provide a unique name for the custom OAuth. For example, Okta. Click Add.

  4. Make note of the callback URL. You will need this to configure the Okta app. For example, https://dev.rocket.cat/_oauth/okta

Configure Okta as the Identity Provider

Now, in your Okta developer account, follow these steps:

  1. Create a new app integration on your Okta application dashboard.

  2. Select the Sign-in method as OIDC - OpenID Connect.

  3. Select the Application type as Web Application. Click Next.

  4. Provide a name for the new web app integration.

  5. For the Sign-in redirect URIs field value, enter the callback URL you got from the Rocket.Chat workspace.

  6. For this example, we will select the Assignments value as Allow everyone in your organization to access. Alternatively, you can assign users or groups to the app.

  7. Click Save.

The application is created. Copy the client ID and the client secret values. You will need these values to configure Okta as the identity provider in Rocket.Chat

Configure Okta in Rocket.Chat

In your Rocket.Chat workspace and follow these steps:

  1. Login to Rocket.Chat with an administrator account and go to Administration > Settings > OAuth.

  2. Select the custom OAuth method that you created and enable it.

  3. Enter values for the following details:

To view the endpoints, you can access the discovery document from https://<your-okta-domain>/.well-known/openid-configuration



The URL to your Okta domain with a suffix of /oauth2/v1


Token Path

The token endpoint is used to obtain access tokens.


Token sent via

Select whether the token is sent via Header or Payload.


Identity Token Sent Via

Select whether the identity token is sent via Header, Payload, or the same method as the Token sent via field.

Token sent via

Identity Path

The user information endpoint is used to retrieve user data. Enter the path from the user endpoint.


Authorize Path

Enter the path from the authorization endpoint.



The scope defines the user access level and permissions.

openid email profile groups offline_access

Param Name for access token

The name of the access token.



The client ID from the Okta web app.



The client secret from the Okta web app.


Key Field

The field that will be used to maintain unique user IDs. You can use the Email or Username.


  1. Username field: With this field, you can avoid the possibility of users selecting their own usernames while signing in for the first time. Thus, users will retain the usernames from Okta, maintaining consistency. To do this, follow these steps:

    1. In your Okta account, go to the People tab.

    2. Select the Profile of a user.

    3. Provide a value for the Nickname field.

    4. Now in your Rocket.Chat workspace, enter nickname for the Username field.

  2. Avatar field: Enter picture to use the Okta user avatars.

  3. Click Save changes.

You are now all set! Your users from Okta can now log in to the Rocket.Chat workspace. You can also set the values of other fields according to your requirements.

Last updated

Rocket.Chat versions receive support for six months after release.