Single Sign-On (SSO)
Google SSO
Lago integrates with Google Single Sign-On (Google SSO), enabling your team to access Lago using their existing Google credentials. This seamless integration allows team members to log in with their corporate Gmail accounts, eliminating the need for additional usernames and passwords. This streamlines the login process and enhances security by leveraging Google’s authentication infrastructure.
Okta SSO
PREMIUM ADD-ON ✨
This add-on is available on demand only. Please contact us to get access to this premium add-on.
Lago integrates with Okta Single Sign-On (Okta SSO), enabling your team to access Lago using their existing Okta credentials.
Mandatory Okta settings
Configure an Authorization Server
- Log in to your Okta Admin Console.
- Navigate to Security → API → Authorization Servers.
- Create a new server by clicking Add Authorization Server.
- Name: Choose a name for the auth server (e.g.,
Lago
) - Audience: Enter the audience value which is usually your app’s base URL (e.g.,
https://app.getlago.com
orhttps://eu.getlago.com
) - Description: Optional field to describe the auth server
Create scopes
Scope define the level of access the app is requesting
- In the Authorization Server details, click on Scopes tab.
- Add a new scope that your app requires:
- Name:
user_info
- Display name: Access user info
- Description: This allows you to use user info to sign-in/sign-up to the app
- User consent: Implicit
- Default scope: False
Create an application and settings
- Go to you Okta Admin Console.
- Navigate to Applications → Applications
- Create a new application by clicking Create App Integration
- Sign-in method: Define the method as
OIDC - OpenID Connect
&Web Application
- Grant type: Check the
Refresh token
option - Sign-in redirect URLs: Enter the sign-in redirect value which is usually your app’s base URL with these values (e.g.,
https://app.getlago.com/auth/okta/callback
orhttps://eu.getlago.com/auth/okta/callback
) - Assignments: Define the assignment option based on your policy
Once created, please ensure the
Refresh tokens behaviour
is set toUse persistent token
Connect Lago to Okta
To connect Lago to Okta, please follow these steps:
- Go to your Lago Settings view.
- Access the Authentication section.
- Domain name: usually your app base URL (e.g.,
acme.com
) - Application client ID: Public identifier for the client that is required for all OAuth flows.
- Application client secret: Secret generated by Okta for this application
- Okta organization name: Name of your organization (e.g., for a trial account
trial-5875810
)
Once all these setups are complete, don’t forget to add users to your Okta account and verify their accounts.
Log in to Lago or join an existing organization
Once this integration is switched on, it allows team members to log in or join an existing organization with their corporate Okta accounts, eliminating the need for additional usernames and passwords. This streamlines the login process and enhances security by leveraging Okta’s authentication infrastructure.
Edit or delete Okta’s connection
Once this integration is switched on, you can edit the connection information or delete it. Please note that once deleted, you won’t be able to access Lago via Okta SSO. Use the Forgot password feature to regain access to your account.
Was this page helpful?