Context: Codecov has previously offered Okta login for our dedicated namespace cloud customers.
Problem to Solve
Currently, Codecov's cloud offering lacks the ability to authenticate users via Okta, which is sometimes a limitation/barrier for organizations that rely on Okta for managing user access and security to use Codecov. Providing Okta login for our cloud users will help address this gap, enhancing our product's appeal to security-conscious organizations and sales offering.
Solution
Scope: implementing Okta login using OpenID Connect (OIDC) initially
SAML (security assertion markup language) is NOT is scope for this initial iteration
There are two user flows in the organization:
admin, github admin may access the codecov UI to enter okta credentials
member, any organization members logging into codecov must be authenticated
Context: Codecov has previously offered Okta login for our dedicated namespace cloud customers.
Problem to Solve
Currently, Codecov's cloud offering lacks the ability to authenticate users via Okta, which is sometimes a limitation/barrier for organizations that rely on Okta for managing user access and security to use Codecov. Providing Okta login for our cloud users will help address this gap, enhancing our product's appeal to security-conscious organizations and sales offering.
Solution
Scope: implementing Okta login using OpenID Connect (OIDC) initially
There are two user flows in the organization:
view designs
next steps / timelines (6/10)
okta screenshots
![Screenshot 2024-03-07 at 9 13 30 AM](https://github.com/codecov/engineering-team/assets/87861036/0aa08a05-ff0c-44b9-91d8-604201647049)