--- title: Using Okta as a trusted identity provider slug: '1975' canonical_url: https://docs.coveo.com/en/1975/ collection: index-content source_format: adoc --- # Using Okta as a trusted identity provider Coveo [SharePoint Server sources](https://docs.coveo.com/en/2061/) support SharePoint instances using Okta as a trusted identity provider. When configuring a SharePoint Server source, you can therefore allow Coveo to authenticate users in SharePoint via Okta. Before you create a SharePoint security provider and source, however, you must retrieve two application parameters from Okta, as these parameters are required in the [SharePoint Server source configuration](https://docs.coveo.com/en/2061#authentication-section). . Log in to your [Okta Developer](https://developer.okta.com/) account. . Click **Admin**. . Click **Applications**, and then, in the dropdown menu, select **Applications**. . Click the **SharePoint (On-Premise)** application linked to the SharePoint instance you want to make searchable. . Click **Sign On**. . Under **Settings** > **Sign On Methods**, click **View Setup Instructions**. . On the new page that appears, under **Setup a new authentication provider** > **Create the Okta Trusted Token issuer using PowerShell Script**, take note of the `$realm` and `$signInURL` values, which should respectively be formatted as follows. These values are required when [creating your SharePoint Server source](https://docs.coveo.com/en/2061#authentication-section). ** `urn:okta:sharepoint:myid` ** `+https://YOURINSTANCE.OKTA_OR_OKTAPREVIEW.com/app/sharepoint_onpremise/sso/wsfed/passive+`