Available starting Wednesday, April 15th, 2026.
About
Set up Okta as your Single Sign-On (SSO) identity provider to let users log in to RXNT with their Okta credentials. This integration simplifies account management and enhances security by centralizing authentication through your organization’s Okta domain. This article walks you through the steps to configure Okta as your SSO identity provider in RXNT, including how to generate the necessary credentials and complete the setup.
Configure Okta for SSO with RXNT
Create an application integration in Okta
Log in to Okta and navigate to the Admin Console. Navigate to Applications, then select Applications.
Click the Create App Integration button.
Select OIDC - OpenID Connect as the Sign-in method and Web Application as the Application type, then click Next.
Enter an App integration name and ensure that Authorization Code is checked. Then, enter https://auth.rxnt.com/oauth2/callback as the Sign-in redirect URI.
Under the Assignments section, select Allow everyone in your organization to access. Then, click Save.
Save client ID, issuer URL, and secret
Copy the Client ID and Secret and save them for later use.
Click on the Sign On tab.
Navigate to the OpenID Connect ID Token section and change the Issuer to use the Okta URL. Click Save and copy this URL to use in a later step.
Configure SSO identity providers settings
You must have the practice administrator role to access this.
Log in to the RXNT Product Dashboard. In the top right corner, click on the Utilities menu, then click Settings.
Select SSO Identity Providers from the left side menu, then toggle on Enable Single Sign-On (SSO) for this company.
Select Okta as the identity provider, and enter the Client ID, Client Secret, and Issuer URL from the previous step.
Click Save.
All users within your practice will now be able to log in to RXNT using their Okta credentials.
Disable external identity provider
If you need to temporarily turn off SSO for your organization, you can disable the Okta connection without deleting it. Disabling SSO prevents users from signing in with Okta, but your configuration and credentials will remain saved, so you can re-enable it at any time.
To disable it, go to the Login Management screen and toggle off Enable Single Sign-On (SSO) for the company.
Click Disable to confirm.
Once disabled, users must sign in using their RXNT credentials until SSO is re-enabled.
To re-enable, toggle on Enable Single Sign-On (SSO) for this company.
Click Enable to confirm the action.
All users within your practice will now be able to log in to RXNT using their Okta credentials again.
Delete external identity provider
Deleting the Okta identity provider permanently removes your SSO configuration and stored credentials. The users in your organization will need to log in with RXNT credentials. This action cannot be undone. If you later want to use Okta for SSO again, you’ll need to re-enter your credentials and complete the setup process from the beginning.
On the Login Management screen, click Delete.
Type DELETE into the box, then click the Delete button.
Users will now need to log in with their RXNT credentials or another enabled identity provider.
Still need help? Contact us!
Have a great idea? Tell us about it!