Steps to configure OAuth- or OpenID-Connect-based SSO for Okta

About Okta

Okta is an identity management platform that provides identity management capabilities for workforces.

The following steps will help you enable single sign-on (SSO) based on OAuth or OpenID Connect (OIDC) for Okta from ManageEngine Identity360.

Prerequisites

  1. The MFA and SSO license for Identity360 is required to enable SSO for enterprise applications. For more information, refer to the pricing details.
  2. Log in to Identity360 as an Admin or Super Admin, or as a Technician with a role that has Application Integration and Single Sign-on permissions.
  3. Navigate to Applications > Application Integration > Create New Application and select Okta from the applications displayed.
  4. On the General Settings tab, enter the Application Name and Description.
  5. Under Choose Capabilities, select SSO and click Continue.
     Identity360 application configuration General SettingsGeneral Settings of SSO configuration for Okta.
  6. On the Integration Settings tab, navigate to Single Sign On, click IdP Details, and copy the highlighted field values in the screenshot below.
     Identity360 application configuration Integration SettingsIntegration Settings of SSO configuration for Okta.

Okta (service provider) configuration steps

  1. Log in to Okta as an administrator.
  2. Navigate to Security > Identity Providers > Add identity provider.
    Okta admin portal viewOkta admin portal view
  3. Click OpenID Connect IdP > Next.
    Selecting OpenID Connect IdP from OktaSelecting OpenID Connect IdP from Okta
  4. Fill in the following fields in the General settings section as follows:
    • Name: Enter Identity360.
    • IdP Usage: Select SSO only.
    • Scopes: Select email, openid, and profile.
    Configuring the OIDC identity provider (IdP) in Okta for SSOConfiguring the OIDC IdP in Okta for SSO
  5. Fill in the following fields with the corresponding details copied from the Identity360 portal in step 6 of the prerequisites.
    • Client ID: Paste the client ID.
    • Authentication type: Select the Client secret radio button.
    • Client Secret: Paste the Client Secret.
    • Issuer: Paste the Issuer URL.
    • Authorization endpoint: Paste the Authorization Endpoint URL.
    • Token endpoint: Paste the Token Endpoint URL.
    • JWKS endpoint: Paste the Keys Endpoint URL.
    • Userinfo endpoint: Paste the User Endpoint URL.
    OIDC configuration details in OktaOIDC configuration details in Okta
  6. You can choose to customize the fields under Authentication Settings and JIT Settings as required by your organization.
  7. Click Finish to save the configuration settings.
    Okta OIDC SSO configurationOkta OIDC SSO configuration
  8. After saving, copy the Redirect URI as it will be required during Identity360 configuration.
    The Redirect URI from OktaThe Redirect URI from Okta
  9. To add the instance of Identity360 to Okta's login screen, navigate to the Routing rules tab and click Add Routing Rule.
    Routing rule addition in OktaRouting rule addition in Okta
  10. In the pop-up that appears, provide a suitable Rule Name.
  11. Set the User matches field to Regex on login and set the value to .*. (adjust based on your organization's needs).
  12. Set the Use this identity provider field to Use specific IdP(s) and choose Identity360 from the IdP(s) drop-down list below.
  13. Click Create rule.
    Routing rule creation in OktaRouting rule creation in Okta
  14. In the pop-up that appears, click Activate.
    Routing rule activation for loginsRouting rule activation for logins

Identity360 (identity provider) configuration steps

  1. Switch to Identity360's application configuration page.
  2. In the Login Redirect URL field, paste the Redirect URI copied from step 8 of Okta configuration.
  3. Select the required scopes from the Scope drop-down.

    Note: Scopes define the level of access that can be requested by the service provider (SP) to access a resource. Identity360 supports the following scopes:

    • openid: Establishes that this is an OIDC request
    • email: Requests the user's email attribute
    • profile: Requests the user's profile claims (FirstName and LastName)
  4. Click Save.
    dentity360 application configuration: Integration SettingsIntegration Settings of SSO configuration for Okta
  5. To learn how to assign users and groups to one or more applications, refer to this page.

Your users should now be able to log in to Okta through the Identity360 portal.

Note: For Okta, SP-initiated flows are supported when SSO is enabled through OAuth.

Don't see what you're looking for?

  •  

    Visit our community  

    Post your questions in the forum.

     
  •  

    Request additional resources  

    Send us your requirements.