Okta
Last updated
Was this helpful?
Last updated
Was this helpful?
Was this helpful?
Use these instructions to set up Okta as your SSO provider for Tonic Structural.
You complete the following configuration steps within Okta:
Create a new application. Choose the OIDC - OpenId Connect method with the Single-Page Application option.
Click Next, then fill out the fields with the values below:
App integration name: The name to use for the Ephemeral application. For example, Ephemeral
, Ephemeral-Prod
, Ephemeral-Dev
.
Grant type: Implicit (hybrid)
Sign-in redirect URIs: <base-url>/sso/callback/okta
Sign-out redirect URIs: <base-url>/sso/logout
Base URIs: The URL to your Ephemeral instance
Controlled access: Configure as needed to limit Ephemeral access to the appropriate users
After saving the above, navigate to the General Settings page for the application and make the following changes:
Grant type: Check Implicit (Hybrid) and Allow ID Token with implicit grant type.
Login initiated by: Either Okta or App
Application visibility: Check Display application icon to users
Initiate login URI: <base-url>
After you complete the configuration in Okta, uncomment and configure the following values in the Ephemeral helm chart.
In values.yaml:
# Okta SSO Config
# -----------------
sso:
isEnabled: true
okta:
clientId: <client-id>
domain: <sso-domain>
identityProviderId: <identity-provider-id>
authorizationServerId: <customer auth server if you have one>