Identity
Set Up OIDC Authentication (Okta)
Table of Contents
Expand All
|
Collapse All
Identity Docs
Set Up OIDC Authentication (Okta)
Learn about setting up OIDC authentication for Okta in CIE.
- Set up OIDC as an authentication type in the Cloud Identity Engine.
- Select AuthenticationAuthentication TypesAdd New Authentication Type.Set Up the OIDC authentication type.
Enter a unique and descriptive Authentication Type Name for your OIDC configuration.
Copy the Callback URL/ Redirect URL.
Configure Okta to use OIDC with the Cloud Identity Engine.- Sign in to Okta.
Select ApplicationsApplications.
Click Create App Integration.
Select OIDC - OpenID Connect as the Sign-in method and Web Application as the Application Type then click Next.
Enter an App integration name.
Click Add URI and enter the information you copied in step 1.
Select the Controlled Access you want to allow then click Save.
Obtain the information you need to complete your OIDC Okta configuration.- Copy the Client ID.
Copy the Secret.The secret for Okta does not expire.
Complete and submit the OIDC configuration.- Enter the App integration name you entered in Okta in step 2 as the Client Name.
Enter the Client ID you copied from Okta in step 3.
Enter the Secret you copied from Okta in step 3 as the Client Secret.
Enter the domain name URL for your Okta IdP as the Issuer URL.
(Optional) If you have your Endpoint URL, enter it here. If not, continue to the next step (the Cloud Identity Engine populates the Endpoint URL automatically after you successfully test the connection).
Click Test Connection and log in to confirm that the Cloud Identity Engine can reach your Okta IdP using OIDC.If you did not enter the OIDC Issuer URL in the previous step, the Cloud Identity Engine automatically populates the information.
After confirming that the connection is successful, Submit the configuration.You can now use OIDC as an authentication type when you Set Up an Authentication Profile.