PerimeterX supports logging in to the PerimeterX Portal with Okta as the authentication provider.

PerimeterX supports OIDC / SAML authentication.


Administrative access in both an Okta account and a PerimeterX account is required before configuring Okta.

Configure SAML SSO

To integrate PerimeterX for Okta SAML SSO:

  1. In the Okta Admin, go to Applications -> Applications -> Browse app catalog
  2. Locate the PerimeterX application
  3. Click Add

For more information and instructions on integrating with SAML, refer to the Okta documentation

Configure OIDC SSO

  1. Login to your Okta account and navigate to Applications -> Applications -> Create app integration.
  2. Select sign-in method OIDC - OpenID Connect.
  3. Select Application type -> Web application.
  4. In the section Grant type, fill in as following:
  1. In the section Sign-in redirect URIs fill in
  1. In the section Sign-out redirect URIs fill in (optional)

Configure Okta in the PerimeterX Portal

  1. Login to your PerimeterX console with Admin permissions.
  2. Navigate to Platform Settings-> Accounts
  1. Click Edit
  2. In the Edit Account dialog:

a. Check Enable Single Sign-On (SSO)
b. Select Okta OIDC and enter the following details:

Field Name


Okta Org

The domain in Okta (e.g /
The available domains are or

Okta Application

The Okta Application is extracted from Client Credentials > Client ID value

  1. Make sure to Save Changes
  2. Done!

Inviting Users

When inviting users to login to the PerimeterX Portal with Okta for the first time, refer to the PerimeterX Managing Users Guide for full instructions.

If a user was invited prior to enabling Okta SSO:

  1. In the PerimeterX Portal, delete the existing users’ accounts from Admin > Users.
  2. Re-invite the deleted users as new users according to the instruction in the PerimeterX Managing Users Guide.



To enable the administrator user to login with Okta SSO, delete the user and re-invite (within the same session) by going to Platform Settings-> Users and selecting Invite User.


For more information see the SSO Integration FAQ