Skip to content

Latest commit

 

History

History
67 lines (31 loc) · 3.5 KB

OKTA_INTEGRATION.md

File metadata and controls

67 lines (31 loc) · 3.5 KB

Using Okta as Single Sign-On (SSO) Provider

Our users can add Okta as single sign-on provider. In order to this they can follow the given steps.

Backend

  1. Set up Okta
  • Sign in to your Okta organization (opens new window) with your administrator account.

  • Click the Admin button on the top right of the page

  • Open the Applications configuration pane by selecting Applications > Applications.

  • Click Create App Integration.

  • Select a Sign-in method of OIDC - OpenID Connect, then click Next.

  • Select an Application type of Web Application, then click Next.

image

  • Enter an App integration name and other details.

image

  • Enter the Sign-in redirect URIs for local development, such as http://localhost:1337/connect/okta/callback

  • Enter the Sign-out redirect URIs for both local development, such as http://localhost:1337. For more information on callback URIs, see Define callback route.

  • In the Assignments section, define the type of Controlled access for your app. Select the Everyone group for now. For more information, see the Assign app integrations (opens new window) topic in the Okta product documentation.

screencapture-dev-34603232-admin-okta-com-admin-apps-oauth2-wizard-create-1663192758622

  • Click Save to create the app integration. The configuration pane for the integration opens after it's saved. Keep this page open so that you can copy the values that you will need next to finish configuring your app

  • Update the scopes of your application. Grant access to the scopes mentioned in the image below.

screencapture-dev-34603232-admin-okta-com-admin-app-oidc_client-instance-0oa6eka8coG9fXiS25d7-1662465158554 (1)

  1. Start the Strapi server using npm run develop.

  2. Visit this page http://localhost:1337/admin/plugins/users-permissions/providers

  3. Press the Okta provider and enable it.

  4. Enter all the details. Client ID,Client Secret you will get on the Okta dashboard.

  5. Enter the Subdomain. Don't add the whole domain only add the initial name for eg example.okta.com for such domain only add example the initial part of the URL.

  6. Set State to true and redirect URL to the frontend app to the http://localhost:3000/connect/okta/redirect.

image (1)

  1. After this you need to visit the plugin Roles and Permissions and give access to getProviders under the Public Role.
  2. After clicking the Public Role and scroll down and click on the Users-Permissions tab and there you will find the getProviders

enter image description here

That's all . You can now use Okta SSO provider.