- 
Login to Okta Developer. 
- 
From the sidebar click Applications > Applications. 
- 
From the Applications page click “Create App Integration“. 
- 
Choose “OIDC - OpenID Connect“ as the Sign-in method, “Web Application“ as Application type.  
- 
Click “Next”. 
- 
Under “General Settings“ provide a “App integration name“ 
- 
Under “Assignments“ choose an appropriate “Controlled access“ for your organisation. Choose “Skip group assignment for now“ to set at a later date.  
- 
Click “Save“. 
- 
Once saved you should have access to the Client ID, Client secret and Okta domain. Please provide these to the Mallcomm Team to setup your app as an integration. 
- 
Once the integration is complete on the Mallcomm server we will provide the correct Sign-in redirect URIs and Sign-out redirect URIs to update in the “LOGIN“ section under “General Settings“ for your application (shown above). 
- 
This completes your integration with Mallcomm SSO. 
Additional Assets
| Name | Requirements | Where it’s used | 
|---|---|---|
| Logo | 
 | At the top of the bespoke Auth Service login screen. | 
| Icon | 
 | On the buttons towards the bottom of the bespoke Auth Service login screen. | 
| Brand Colour | 
 | Throughout the bespoke Auth Service login screen. | 
| Email Domain Patterns | A list of domain patterns that enforces a user to sign in with a companies Active Directory e.g. (.*)@toolboxgroup.global. | When redirected to our auth service if a pattern matches you are taken to the bespoke page rather then the standard login. |