Intended Audience: Okta administrators and Gumloop organization administrators. This setup is performed once at the organization level and enables Okta authentication for all organization members.
What This Guide Covers
This documentation walks through two main configuration areas:- Okta Configuration - Register Gumloop as an OAuth application in your Okta Admin Console
- Gumloop Configuration - Add the Okta OAuth credentials to your organization at gumloop.com/settings/organization/credentials
Overview
Okta integration enables enterprise organizations to leverage their existing identity management infrastructure for Gumloop authentication. Instead of managing separate credentials for each service, users authenticate through Okta, which acts as the central authorization server.Currently supported services: Snowflake, NetSuite. Additional enterprise integrations with Okta support will be added over time.
Why Use Okta with Gumloop?
Centralized Authentication
Single sign-on experience across all Gumloop-connected services
Enhanced Security
Leverage your organization’s existing security policies and MFA
Simplified Management
Manage access and permissions from one central location
Compliance Ready
Meet enterprise security and compliance requirements
How It Works
When Okta is configured for Gumloop, authentication follows this flow:Okta acts as the intermediary between Gumloop and external services. Instead of Gumloop directly authenticating with services like Snowflake, it uses the access token from Okta to verify the user’s identity and permissions.
Prerequisites
Before configuring Okta for Gumloop, ensure you have:1
Okta Admin Access
You must have administrator privileges in your Okta organization to create applications and authorization servers.
2
Service Integrations
The services you want to connect through Okta (e.g., Snowflake, NetSuite) should already be configured in your Okta environment.
3
Gumloop Organization
Your organization must be on an Enterprise plan with organization credentials enabled.
Configuration Procedure
The setup process involves three main stages: creating the Gumloop OAuth client, configuring an authorization server, and collecting the necessary information.Important: The steps below are representative examples for configuring Okta for External OAuth. You can configure Okta to any desired state and use any desired OAuth flow, provided you can obtain the necessary information for Gumloop’s organization credentials.Always consult your internal security policies when configuring an authorization server to ensure your organization meets all necessary regulations and compliance requirements.
Step 1: Create an OAuth Client for Gumloop
First, you’ll create an OAuth-compatible client application in Okta that represents Gumloop.1
Navigate to Applications
- Log in to the Okta Admin Console
- Click Applications in the left sidebar
- Click Create App Integration
2
Select Application Type
- For Sign-in method, select OIDC - OpenID Connect
- For Application type, select Web Application
- Click Next
3
Configure Application Settings
Enter the following details:
- App integration name:
Gumloop - App logo: Upload the Gumloop logo using this link
- Grant type: Check the following:
- Authorization Code
- Refresh Token
- Sign-in redirect URIs:
https://api.gumloop.com/auth/callback - Sign-out redirect URIs: (optional, leave blank if not needed)
- Controlled access: Choose based on your organization’s needs
Adding the Gumloop logo helps your users easily identify the application in their Okta dashboard and during authentication flows.
4
Enable Client Authentication
- In the newly created application, go to the General tab
- Scroll to Client Credentials
- Click Edit next to Client authentication
- Select Use Client Authentication
- Click Save
5
Save Client Credentials
In the Client Credentials section, you’ll see:
- Client ID - Save this value (you’ll need it as
<OAUTH_CLIENT_ID>) - Client secret - Save this value (you’ll need it as
<OAUTH_CLIENT_SECRET>)
Keep these credentials secure. You’ll need them when configuring Gumloop’s organization credentials.
Step 2: Create an Authorization Server
Next, set up an authorization server that will handle authentication requests for Gumloop.1
Access Authorization Servers
- In the Okta Admin Console, navigate to Security > API
- Click the Authorization Servers tab
- Click Add Authorization Server
2
Configure Server Details
Enter the following information:
- Name:
Gumloop Authorization Server(or your preferred name) - Audience: Your service URL (e.g.,
https://abc12345.snowflakecomputing.comfor Snowflake) - Description: Optional description for documentation purposes
3
Save the Authorization Server ID
After creating the authorization server, you’ll see an Issuer URL with a format like:The Authorization Server ID is the part after
/oauth2/ (in this example: aus8x7abc123def). Save this value as <AUTHORIZATION_SERVER_ID> - you’ll need it for Gumloop configuration.Step 3: Configure Scopes
Scopes define what permissions and data the Gumloop application can access.1
Add Base Scopes
- In your authorization server, click the Scopes tab
- Click Add Scope for each of the following:
| Scope Name | Display Name | Description |
|---|---|---|
openid | OpenID | Required for OpenID Connect authentication |
profile | Profile | Access to user profile information |
email | Access to user email address | |
offline_access | Offline Access | Enables refresh tokens for long-term access |
These are the minimum required scopes for Gumloop. Mark each as a Default scope so they’re automatically included in authentication requests.
2
Add Service-Specific Scopes (Optional)
Depending on which services you’ll use with Gumloop, you may need additional scopes. For example:
- Snowflake: Create scopes like
session:role:analystorsession:role:developerto map to Snowflake roles - NetSuite: Add any required NetSuite-specific scopes
Step 4: Create Access Policy and Rules
Access policies control who can obtain tokens and under what conditions.1
Create an Access Policy
- In your authorization server, click the Access Policies tab
- Click Add Policy
- Enter the following:
- Name:
Gumloop Access Policy - Description: Optional description
- Assign to: Select the Gumloop client application you created earlier
- Name:
- Click Create Policy
2
Add a Rule to the Policy
- In the newly created policy, click Add Rule
- Configure the rule:
- Rule name:
Standard Access Rule - Grant type: Select the following:
- Authorization Code
- Resource Owner Password
- Client Credentials
- Refresh Token
- User is: Select based on your organization’s needs (typically “Any user assigned the app”)
- Scopes requested: Select “The following scopes:” and choose:
openidprofileemailoffline_access- Any service-specific scopes you created
- Token lifetime: Configure according to your security policies (defaults are typically sufficient)
- Rule name:
- Click Create Rule
Step 5: Collect Required Information
Now gather all the information you’ll need to configure Gumloop.1
Verify Your Collected Information
Ensure you have all of the following values before proceeding to configure Gumloop:
| Information Needed | Where to Find It | Your Value |
|---|---|---|
| Okta Domain | Your Okta URL (e.g., company.okta.com) | <OKTA_DOMAIN> |
| Authorization Server ID | From Step 2 - the part after /oauth2/ in the Issuer URL | <AUTHORIZATION_SERVER_ID> |
| Client ID | From Step 1 - in the Client Credentials section | <OAUTH_CLIENT_ID> |
| Client Secret | From Step 1 - in the Client Credentials section | <OAUTH_CLIENT_SECRET> |
These four values are all you need to configure Okta authentication in Gumloop. Make sure you have them ready before proceeding to the next section.
Configuring Gumloop Organization Credentials
After completing the Okta setup, you’ll need to add these credentials to Gumloop so your organization members can use Okta authentication.This step must be completed by a Gumloop organization administrator. Regular users cannot configure organization credentials.
1
Navigate to Organization Credentials
2
Add Okta OAuth Configuration
- Click Add Credential
- Search Okta OAuth
- Choose Okta as the authentication type

3
Enter Okta Details
Fill in the form with the four values you collected:
- Okta Domain:
<OKTA_DOMAIN>(e.g.,company.okta.com) - Authorization Server ID:
<AUTHORIZATION_SERVER_ID>(e.g.,aus8x7abc123def) - Client ID:
<OAUTH_CLIENT_ID> - Client Secret:
<OAUTH_CLIENT_SECRET>

User Authentication Flow
Once Okta is configured, here’s what the authentication experience looks like for your organization members:- For Organization Members
- What Users See
Standard Authentication Experience
When a user needs to authenticate with a service that uses Okta:- Navigate to their personal credentials page
- Find the service (e.g., Snowflake)
- Click the Authenticate button
- Get redirected to your organization’s Okta login page
- Enter their Okta credentials
- Approve the requested permissions (first time only)
- Get redirected back to Gumloop - authentication complete!
Users don’t need to configure anything - they simply authenticate through Okta using their existing credentials. The organization’s OAuth configuration is automatically used.


Testing Your Configuration
Before rolling out Okta authentication to your entire organization, verify the setup works correctly.1
Test User Authentication
- Have a test user navigate to their Gumloop credentials page
- Click the authentication button for a configured service
- Verify they’re redirected to Okta
- Complete the authentication flow
- Confirm successful authentication in Gumloop
2
Test Workflow Execution
- Create a simple workflow using the Okta-authenticated service
- Run the workflow
- Verify it executes successfully using Okta credentials
- Check that data is retrieved correctly
Advanced Configuration
Using ANY Role with External OAuth
Some services (like Snowflake) support a specialsession:role-any scope that allows users to switch roles after authentication rather than being locked to a specific role.
1
Add ANY Role Scope
In your authorization server, create a scope named
session:role-any with:- Display name:
Any Role - Description:
Allows switching between available roles after authentication
2
Configure Policy
Update your access policy rule to include the
session:role-any scope in the list of allowed scopes.3
User Experience
Users who authenticate with this scope can switch between their assigned roles within workflows, providing flexibility for workflows that require different permission levels.
Multiple Authorization Servers
For complex organizations, you may want separate authorization servers for different environments or services:- By Environment
- By Service
Development vs ProductionCreate separate authorization servers:
Gumloop Development- For testing and development workflowsGumloop Production- For production workflows
- Separate token lifetimes and policies
- Isolated audit trails
- Different scopes for each environment
Related Documentation
Credentials
Learn about personal, workspace, and organization credentials
AI Model Governance
Configure organization-wide AI model access and routing
Custom User Roles
Manage organizational roles and permissions
Need Help?
If you encounter issues during setup or have questions about Okta integration:- Email: support@gumloop.com
- Okta Support: For Okta-specific configuration questions, consult Okta’s documentation