Setting up Okta Groups Mapping with ChargeDesk
ChargeDesk supports integrating with Okta as an OpenID Connect provider. This enables Single Sign On (SSO) for your team, allowing them to sign in to ChargeDesk using their Okta account.
If you want to map Okta groups to specific ChargeDesk roles (e.g., "Okta-Admins" → Admin, "Okta-Agents" → Agent), enable group mapping for more granular control. This requires creating an App Integration in Okta.
This guide will help you configure Okta to work with groups mapping in ChargeDesk, allowing you to sync Okta groups with ChargeDesk roles.
Step 1: Create a New App Integration
- Log into your Okta Admin Console
- Navigate to Applications > Applications
- Click Create App Integration
- Select OIDC - OpenID Connect as the Sign-in method
- Select Web Application as the Application type
- Click Next
Step 2: Configure App Settings
- Enter ChargeDesk as the App integration name
- Under Grant type, select both:
- Client Credentials
- Authorization Code
- For Sign-in redirect URIs, enter:
https://chargedesk.com/sso/redirect
- For Sign-out redirect URIs, enter:
https://chargedesk.com/sso/sign-out
- Under Controlled access, choose one of:
- Allow everyone in your organization to access - for full organization access
- Limit access to selected groups - to restrict access to specific groups
- Click Save
Step 3: Configure Groups Claim
- After creating the app, go to the Sign On tab
- Click Edit next to OpenID Connect ID Token
- Find the Groups claim filter section
- Configure the following:
- Claim name:
groups
- Match type: Select Matches regex
- Value:
.*
(this will include all groups)
- Click Save
Step 4: Complete Setup in ChargeDesk
- Copy your Client ID and Client Secret from the Okta app's General tab
- In ChargeDesk, navigate to your SSO settings
- Enter the Okta configuration details including the Client ID and Client Secret
- Select Map SSO Groups to ChargeDesk Roles next to Access Levels
Note: Users will be automatically assigned to ChargeDesk teams based on their Okta group membership. Make sure your Okta groups are properly configured before enabling this feature.
Best Practices for App Assignments
Assign users via groups for dynamic access - direct individual assignments may skip groups in tokens.
- In Applications > ChargeDesk > Assignments tab.
- Remove individual user assignments (keep groups).
- Assign groups (e.g., "ChargeDesk-Admins") to the app users in them inherit access.
- Verify: Groups should show >0 Applications in Directory > Groups.