Sign in

Enter your organisation details to access your tenant.

or
Enter your organisation name above, then click Sign in with Okta
Enrolled Agents
browser instances
Active Policies
rules enforced
Events (24h)
security events
Critical Threats
needs review

Recent Security Events

Loading…
Loading…
Loading…
Loading…
Loading…

How it works

1. Click Generate Token — creates a one-time 30-day token.
2. Share the token with the user installing Spirex Browser.
3. They paste it in Settings → Cloud Sync on first boot.
4. The browser exchanges it for a long-lived agent JWT and appears in Browser Agents.

Okta Status

Checking…

Configuration

From your Okta app integration. Stored encrypted.
Okta group whose members get admin console access. Leave blank to allow all Okta users.
1. Okta Admin Console → Applications → Create App Integration
2. Choose OIDC — Web Application
3. Sign-in redirect URI → https://your-domain/api/v1/auth/okta/callback
4. Sign-out redirect URI → https://your-domain
5. Assignments → assign the groups who should access Spirex
6. Add groups claim to ID token (Okta Admin → Security → API → default → Claims)
Map Okta group names to Spirex policy IDs. Members of that group automatically get those policies enforced.
Loading…

Connectors

Loading…

Published Apps

Loading…