This guide walks workspace administrators through configuring single sign-on (SSO) between Okta and Fellow using OpenID Connect (OIDC).
Requirements
A Fellow account on an Enterprise plan with SSO enabled
A Fellow workspace administrator account
An Okta administrator account (or coordination with your IT team)
Supported Features
Feature | Description |
SP-Initiated SSO | Users initiate authentication by signing in to Fellow directly, and are redirected to Okta to complete login. |
IdP-Initiated SSO | Users initiate authentication from within the Okta dashboard and are directed into Fellow upon successful login. |
Part 1: Enable the Okta Integration in Fellow
Sign in to Fellow using a workspace administrator account.
Navigate to Settings β Account Integrations and select the Okta card.
Click the Connect button in the top-right corner of the page.
A configuration form will appear. Keep this page open β you will return to it after completing Part 2.
Part 2: Configure the Fellow Application in Okta
2.1 Add the Fellow Application
Sign in to your Okta account and navigate to Applications at:
https://<your_workspace>.okta.com/admin/apps/activeClick Browse App Catalog, search for Fellow.app, and click Add.
On the Add Fellow.app configuration form, enter your Fellow subdomain. You can find your subdomain on the Fellow configuration form from Part 1.
Click Done to complete adding the application.
2.2 Copy SSO Credentials to Fellow
On the Fellow application page in Okta, navigate to the Sign On tab.
Copy the Client ID and Client Secret values.
Return to the Fellow configuration form from Part 1 and paste each value into its corresponding field.
2.3 Enter Your Okta Domain
In the top-right corner of your Okta account, click your user email address to open the dropdown menu.
The third line displayed will be your Okta domain, in the format
<subdomain>.okta.com. Copy this value.Paste it into the Domain field on the Fellow configuration form.
Verifying the Integration
Once all fields are completed, click Save. Fellow will automatically perform a test authorization with Okta. If the test is successful, the integration will be marked as Okta is enabled, confirming that SSO is active and available to users in your workspace.
If the test fails, verify that the Client ID, Client Secret, and Domain values have been entered correctly, and that your Fellow subdomain is accurately configured in Okta.
