: Configure Okta Directory
Focus
Focus

Configure Okta Directory

Table of Contents

Configure Okta Directory

The Cloud Identity Engine can integrate Okta Directory information. When you configure your Okta Directory as part of the Cloud Identity Engine, the Cloud Identity Engine uses Okta Directory to collect user and group attribute information for Security policy enforcement and for visibility into the users who access your network.
You must create a separate OpenID Connect (OIDC) app integration to configure an Okta directory for the Cloud Identity Engine, even if you’ve configured Okta as an identity provider for SAML. If you try to use the SAML app to configure an Okta directory instead of creating a new OIDC app, the initial sync might be successful, but any subsequent syncs fail because the refresh token from the gallery application does not support this configuration.
You can select one of two methods for the Cloud Identity Engine to use to connect to your Okta Directory:
  • The Auth Code Flow, which requires you to log in to make changes to the directory configuration in the Cloud Identity Engine.
  • (Recommended) The Client Credential Flow, which initially requires additional permissions but does not require you to log in to change the directory configuration in the Cloud Identity Engine.
For an Okta directory, the Cloud Identity Engine retrieves updates from the directory using the following schedule:
  • Users, Groups, and Devices—When the Cloud Identity Engine syncs changes.
  • Apps—Every x hours (where x is either a maximum of three hours or the duration necessary to complete the previous apps sync).

Deploy Auth Code Flow for Okta Directory

Deploying the Auth Code Flow for Okta Directory requires you to log in using administrator privileges to change the configuration for the Okta directory in the Cloud Identity Engine and that you reconnect the Okta directory every 90 days to avoid sync failure.
  1. If you have not already done so, activate the Cloud Identity Engine and obtain the Sign-in redirect URI for Okta.
    1. After activating the Cloud Identity Engine, log in to the hub and select the Cloud Identity Engine app.
    2. Copy the URL for your Cloud Identity Engine tenant and edit it to obtain the Sign-in redirect URI that Okta requires. To edit the URL, replace the text after the domain with /authorize. For example, if your Cloud Identity Engine tenant URL is https://directory-sync.us.paloaltonetworks.com/directory?instance=<InstanceId>, your Redirect URL is https://directory-sync.us.paloaltonetworks.com/authorize.
  2. Using the Okta Administrator Dashboard, prepare to add your Okta Directory in the Cloud Identity Engine.
    To set up an Okta Directory in the Cloud Identity Engine, you must create a user then assign Admin Roles to that user to grant privileges for the Okta Directory in the Okta Administrator Dashboard (SecurityAdministratorsAdminsAdd Administrator).
    This is the account you’ll assign to the app in step 2.6. This is also the same account you'll use to log in for step 8 when using the Auth Code Flow for your Okta Directory.
    1. Create an app integration for the Cloud Identity Engine app in Okta.
    2. Select OIDC - OpenID Connect as the Sign-in method.
    3. Select Web Application as the Application type then click Next.
    4. Click the X button to clear the current entry and replace the existing Sign-in redirect URIs with the edited URL from step 1.2.
      Palo Alto Networks recommends separating regions by aligning region-specific tenants with region-specific Okta accounts. However, for testing, if you have Cloud Identity Engine tenants in more than one region, add Sign-in redirect URIs for each region where you have a tenant.
    5. Skip the steps for Sign-out redirect URIs and Base URIs as these aren't required.
    6. Since you will assign Controlled Access later in this procedure, Skip group assignment for now then Save the configuration.
      When you assign the app in step 5.a, be sure to assign the app only to the administrator you created in the first step.
  3. Configure the Okta app integration.
    1. Edit the General Settings for the app you just created.
    2. Select Refresh token as the Grant type.
      Using the refresh token is mandatory.
    3. Select Use persistent token.
      If you select the Auth Code Flow configuration, you must reconnect the Okta directory every 90 days to prevent sync failure. If you don't want to reconnect the Okta directory every 90 days, reconnect the directory and select the Client Credential Flow option.
    4. Save your changes.
  4. Obtain the information about your Okta app integration that you need to configure in the Cloud Identity Engine.
    1. At the top of the page, select General (if it is not already selected), then copy your Client ID and Secret.
    2. Select your username in the upper right to copy your Okta domain.
  5. Assign the app and grant the required permissions for the Cloud Identity Engine to access your Okta directory information.
    1. Select Assignments, then assign the Cloud Identity Engine app to the administrator who configures the Okta integration in the Cloud Identity Engine.
    2. Select Okta API Scopes and grant consent to the following scopes:
      • okta.authorizationServers.read (Required only if you have more than one Okta authorization server)
      • okta.groups.read
      • okta.logs.read
        The Cloud Identity Engine requires this scope to read the following log events only:
        • user.lifecycle.delete.initiated
        • group.lifecycle.delete
        • user.lifecycle.activate
        • user.lifecycle.deactivate
        The Cloud Identity Engine uses a filter to retrieve only these events, it does not receive any other events for this scope.
      • okta.users.read
      • okta.users.read.self
      If you want the Cloud Identity Engine to collect enterprise application data so that it is included when you View Directory Data, you must grant consent to the okta.apps.read scope before you select the option in step 9.
      If all the scopes display Not granted and you cannot view the Grant option, scroll to the bottom of the page and scroll over within the table to view the option.
  6. In the Cloud Identity Engine app, select DirectoriesAdd Directory.
  7. Set Up a Cloud Directory and select Okta.
  8. Select Auth Code Flow as the method you want to use to log in to the Okta directory.
  9. Select whether you want to Collect enterprise applications data so that it displays when you View Directory Data.
  10. (Strata Logging Service only) Select whether you want to Collect authentication logs and forward to Strata Logging Service.
    If you select this option, the Cloud Identity Engine forwards the Okta authentication logs from the previous 24 hours to the Strata Logging Service for storage, auditing purposes, and use by Autonomous Digital Experience Management (ADEM).
  11. Specify your Okta Directory information to allow the Cloud Identity Engine to connect to your Okta Directory.
    1. Paste your Okta Directory Domain that you copied in step 4.2.
    2. Paste your Okta Directory Client ID and Client Secret that you copied in step 4.1.
      The Client ID must begin with 0.
  12. Click to Sign in with Okta and enter your Okta Directory credentials.
    When the login is successful, Logged In displays. Palo Alto Networks recommends using the built-in authorization server. If you have more than one Okta authorization server, repeat the previous steps for each additional Okta Directory you want to add.
  13. Click Test Connection to verify your configuration.
    When the test is successful, Success displays.
  14. (Optional) Customize the name the Cloud Identity Engine displays for your Okta Directory.
    By default, the Cloud Identity Engine uses the default domain name.
    You can use up to 15 lowercase alphanumeric characters (including hyphens, periods, and underscores) for the directory name in the Cloud Identity Engine. You don't need to change the name of the directory itself, only the name of the directory in the Cloud Identity Engine app.
  15. Submit the configuration.
    You can now use information from your Okta Directory in the Cloud Identity Engine when you configure a user- or group-based Security policy rule or with other Palo Alto Networks applications.
    For optimal performance, the Cloud Identity Engine does not support the default Okta group "Everyone" because Okta does not recommend using this group to define policy rules.
Next Steps: