Steps to set Okta as an OIDC identity provider
Scroll down to the Assignments section and select one of the options based on your choice and then click on Save.
/>

Give the connection a name, paste the Metadata URI copied before, into the Discovery Endpoint,and paste the Client ID and Client secret copied before into the Client ID and Client Secret fields respectively,and then click on Connect.

Configure the mapping between the roles in Cosmo and the user groups in Okta. The field Group in the provider can be populated with the name of the group or a regex to match the user groups. Once all the mappers are configured, click on Save.

Navigate back to the application created on Okta and populate the Sign-in and Sign-out redirect URIs with the above-copied values. Click on Save.

Navigate to Security-> API, and click on the default auth server. Navigate to the claims tab and then click on Add Claim.

Name the claim “ssoGroups”, and include it in the ID Token, for the value type select Groups, and for the filter select Matches regex and populate the field with ”.*”.Click on Create.

Please make sure that the users added to the application have a username.






