You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/setting_up_authentication/Setting-up-authentication-with-Okta.md
+12-12Lines changed: 12 additions & 12 deletions
Original file line number
Diff line number
Diff line change
@@ -4,17 +4,17 @@ The following guide will assist you in configuring your application to use Okta
4
4
5
5
## Configure a new application in Okta
6
6
1. Log into the Okta admin console with administrative credentials, select `Applications` then `Applications`
7
-
2. Click `Add application`, then `Create new app`
8
-
3. Select `Web` as the platform, and `Open ID Connect` as the sign on method
9
-
3. Enter `Lithnet Access Manager` or another suitable application name and optionally provide a logo
10
-
4. For the login redirect URI, enter the base URL where your Lithnet Access Manager app is hosted followed by `/auth/` (eg `https://accessmanager.lithnet.local/auth/`)
11
-
5. On the general settings page, click `Edit`
12
-
6. Set the logout URL to your base URL, and append `/auth/logout` to the end of it (eg `https://accessmanager.lithnet.local/auth/logout`)
13
-
7. Copy the `client ID` and `client secret` value for use later in the setup process
14
-
8. Assign the appropriate users to the app
15
-
9. Select `Directory` from the main menu bar, and select `Profile editor`. Find the `Lithnet Access Manager` app in the list, and click the `Profile` button
16
-
10. Click `Add attribute` and create a new attribute called `upn`, of data type `string`. Select both the `attribute required` and `User personal` check boxes
17
-
11. Click the `Map attributes` button. Find the UPN value, and map it to the okta attribute that contains the Active Directory UPN (eg aduser.userPrincipalName)
7
+
2. Click `Add application`, then `Create app integration`
8
+
3. Select `Open ID Connect` as the sign in method and and `Web application` as the application type
9
+
4. Enter `Lithnet Access Manager` or another suitable application name and optionally provide a logo
10
+
5. Ensure that `authorization code` is the selected grant type
11
+
6. For the sign in redirect URI, enter the base URL where your Lithnet Access Manager app is hosted followed by `/auth/` (eg `https://accessmanager.lithnet.local/auth/`)
12
+
7. Set the sign out redirect URI to your base URL, and append `/auth/logout` to the end of it (eg `https://accessmanager.lithnet.local/auth/logout`)
13
+
8. Assign the appropriate users to the app and save the new app
14
+
9. From the new app page, copy the `client ID` and `client secret` value for use later in the setup process
15
+
10. Select `Directory` from the main menu bar, and select `Profile editor`. Find the `Lithnet Access Manager` app in the list, and click the `Profile` button
16
+
11. Click `Add attribute` and create a new attribute called `upn`, of data type `string`. Select both the `attribute required` and `User personal` check boxes
17
+
12. Click the `Mappings` button. Find the UPN value, and map it to the okta attribute that contains the Active Directory UPN (eg aduser.userPrincipalName)
18
18
19
19
## Configure Lithnet Access Manager
20
20
1. Open the Lithnet Access Manager Service configuration tool
@@ -25,4 +25,4 @@ The following guide will assist you in configuring your application to use Okta
0 commit comments