Okta

Use these instructions to set up Okta as your SSO provider for Tonic Structural.

Okta configuration

You complete the following configuration steps within Okta:

  1. Create a new application. Choose the OIDC - OpenId Connect method with the Single-Page Application option.

  2. Click Next, then fill out the fields with the values below:

    • App integration name: The name to use for the Ephemeral application. For example, Ephemeral, Ephemeral-Prod, Ephemeral-Dev.

    • Grant type: Implicit (hybrid)

    • Sign-in redirect URIs: <base-url>/sso/callback/okta

    • Sign-out redirect URIs: <base-url>/sso/logout

    • Base URIs: The URL to your Ephemeral instance

    • Controlled access: Configure as needed to limit Ephemeral access to the appropriate users

  3. After saving the above, navigate to the General Settings page for the application and make the following changes:

    1. Grant type: Check Implicit (Hybrid) and Allow ID Token with implicit grant type.

    2. Login initiated by: Either Okta or App

    3. Application visibility: Check Display application icon to users

    4. Initiate login URI: <base-url>

Ephemeral configuration

After you complete the configuration in Okta, uncomment and configure the following values in the Ephemeral helm chart.

In values.yaml:

# Okta SSO Config
# -----------------
sso:
  isEnabled: true
  okta:
    clientId: <client-id>
    domain: <sso-domain>
    identityProviderId: <identity-provider-id>
    authorizationServerId: <customer auth server if you have one>

Last updated