Skip to content
  • Home
  • Watch Demos
  • Pricing
  • Documentation
  • About Us
  • IQNOX
Let's Talk

Onboarding

2
  • Codebeamer setup
  • Getting started

Codebeamer AI Features

7
  • Analyze items in IQNECT
  • Decompose items in IQNECT
  • Use Autocomplete in requirement editors
  • Find items with Semantic and Advanced Search
  • View dashboards in IQNECT
  • Explore traces in IQNECT
  • Initialize indexing from the Indexing UI

SSO Configuration/Setup

7
  • SSO Introduction
  • Okta SAML
  • Okta OIDC
  • Microsoft Entra SAML
  • Generic OIDC
  • Generic SAML
  • Microsoft Entra OIDC

Trust

7
  • How Often does IQNECT Update its AI Models?
  • IQNOX use of Open AI
  • Responsible AI and IQNECT
  • Does IQNECT train models with my data?
  • IQNOX use of Qdrant
  • Does IQNECT continuously pull in new data from Codebeamer as we add requirements to projects?
  • How does IQNECT handle feature requests and release cycles?

Release notes

8
  • 1.3.1
  • 1.5.0
  • 1.3.0
  • 1.4.0
  • 1.5.1
  • 26.1.1
  • 25.4.2
  • 26.1

IQNECT 1.5.0

5
  • Add traces via drag and drop
  • Run IQNECT in Codebeamer X
  • Select existing item suggestions in Decompose
  • Navigate the End-User Admin UI
  • Import a document to Codebeamer

Licensing and Administrative

1
  • Licensing Basis

IQNECT 26.1.0

5
  • Permission control and Resource Shape management
  • Improved Semantic Search with Quick Filters
  • Bulk Refactoring for multiple items
  • Using Find Similar to identify duplicate items
  • Hierarchy preservation and manipulation in Document Importer
View Categories
  • Home
  • Support
  • SSO Configuration/Setup
  • Okta OIDC

Okta OIDC

< 1 min read

If your organization uses Okta Identity Provider (IdP) for user authentication, you can configure IQNECT to allow your users to log in using their IdP credentials. Note that both OIDC and SAML 2.0 protocols are supported when using OKTA as an IdP. This page is specific to OIDC. For SAML 2.0, go to Okta SAML.

Okta integration only supports Service Provider initiated logins.

In Okta, create a SAML Application with the settings below. See the Okta documentation for help.

Setting Value
Sign in redirect URI https://api.iqnect.ai/sso/oidc/callback

Detailed instructions are available below.

1. Creating an application #

2. Okta app configuration #

Once the application is created, the following optional adjustments can be done.

  1. Enable Require PKCE as additional verification
  2. Assign users or groups to IQNECT
  3. Configure mappings to account for the attributes required in Introduction. The following claims should be mapped into: name and email.

3. Send information to IQNOX #

The following information needs to get to IQNOX so the tenant SSO to be configured

  1. clientId
  2. clientSecret
  3. Fully qualified domain name for the Okta tenant. Example https://<OKTA_TENANT_NAME>.okta.com
Updated on 2026-03-06

What are your Feelings

Okta SAMLMicrosoft Entra SAML
Table of Contents
  • 1. Creating an application
  • 2. Okta app configuration
  • 3. Send information to IQNOX
IQNECT-horizontal-dark-text
  • Home
  • Watch Demos
  • About Us
  • IQNOX
  • Pricing
  • Contact Us
Linkedin Twitter Youtube
©️ 2026 IQNOX. All rights reserved.
  • VDP
  • Terms
  • Privacy
  • Cookies