Single Sign-On (SSO) Express Config Setup with Okta for myMobilityHQ
Vialto Partners supports secure and seamless access to myMobilityHQ using Okta Single Sign-On (SSO).
This integration enables your users to log in using their corporate credentials while improving security and simplifying user management.
SSO Login Experience
MyMobilityHQ supports SP-initiated SSO. Users authenticate through Okta and are securely redirected to myMobilityHQ.
Just-In-Time (JIT) Provisioning
User accounts are automatically created during first login—no manual setup required.
Universal Logout
Ensures users are logged out across all sessions when required (e.g., admin action or risk detection).
When a user accesses myMobilityHQ:
They are redirected to Okta for authentication after entering their email.
Upon successful login:
If the user is new → an account is automatically created.
If the user exists → access is granted immediately.
The user is securely logged into myMobilityHQ.
Before starting, ensure:
You have Okta administrator access
You have received admin setup credentials from the Vialto / myMobilityHQ support team
You have confirmed SSO setup is appropriate for your organization
Log in to your Okta Admin Console
Navigate to: Applications → Browse App Catalog
Search for myMobilityHQ
Click Add Integration
Click Done
Open the newly added application
Go to the Sign On tab
Click “Express Configure & Universal Logout”
Select your organization
Enter the credentials provided by myMobilityHQ
Approve the connection to complete setup
In the Sign On tab
Enable:
“Okta system or admin initiates logout”
This ensures users are logged out securely across sessions when needed.
Assign users or groups to the application in Okta
Test login:
Navigate to myMobilityHQ
Confirm redirection to Okta
Log in with an assigned user
Successful login confirms SSO is working correctly.
When enabled, Universal Logout ensures users are signed out of both Okta and myMobilityHQ when:
An administrator manually logs them out
Okta detects a security risk
A session is terminated centrally
This enhances security and prevents unauthorized access, mitigating against threats like session hijacking.
Vialto application sessions end after 15 minutes of inactivity. At this time, a users' sessions will be revoked and users would need to re-authenticate with Okta in order to create a new an application session.
If you encounter issues during setup or testing:
Verify users are assigned to the application
Confirm SSO configuration is completed successfully
Ensure required attributes are mapped correctly
For assistance, contact:
Vialto Partners / myMobilityHQ Support Team: support@gms.vialto.com
April 2026