Our users can add Okta as single sign-on provider. In order to this they can follow the given steps.
- Set up Okta
-
Sign in to your Okta organization (opens new window) with your administrator account.
-
Click the Admin button on the top right of the page
-
Open the Applications configuration pane by selecting Applications > Applications.
-
Click Create App Integration.
-
Select a Sign-in method of OIDC - OpenID Connect, then click Next.
-
Select an Application type of Web Application, then click Next.
- Enter an App integration name and other details.
-
Enter the Sign-in redirect URIs for local development, such as
http://localhost:1337/connect/okta/callback
-
Enter the Sign-out redirect URIs for both local development, such as
http://localhost:1337
. For more information on callback URIs, see Define callback route. -
In the Assignments section, define the type of Controlled access for your app. Select the Everyone group for now. For more information, see the Assign app integrations (opens new window) topic in the Okta product documentation.
-
Click Save to create the app integration. The configuration pane for the integration opens after it's saved. Keep this page open so that you can copy the values that you will need next to finish configuring your app
-
Update the scopes of your application. Grant access to the scopes mentioned in the image below.
-
Start the Strapi server using
npm run develop
. -
Visit this page http://localhost:1337/admin/plugins/users-permissions/providers
-
Press the Okta provider and enable it.
-
Enter all the details. Client ID,Client Secret you will get on the Okta dashboard.
-
Enter the Subdomain. Don't add the whole domain only add the initial name for eg
example.okta.com
for such domain only addexample
the initial part of the URL. -
Set State to
true
and redirect URL to the frontend app to the http://localhost:3000/connect/okta/redirect.
- After this you need to visit the plugin Roles and Permissions and give access to
getProviders
under the Public Role. - After clicking the Public Role and scroll down and click on the Users-Permissions tab and there you will find the
getProviders
That's all . You can now use Okta SSO provider.