Skip to content

Commit 2a106fe

Browse files
Update Setting-up-authentication-with-Okta.md
1 parent 6d5e223 commit 2a106fe

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

docs/setting_up_authentication/Setting-up-authentication-with-Okta.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -4,17 +4,17 @@ The following guide will assist you in configuring your application to use Okta
44

55
## Configure a new application in Okta
66
1. Log into the Okta admin console with administrative credentials, select `Applications` then `Applications`
7-
2. Click `Add application`, then `Create new app`
8-
3. Select `Web` as the platform, and `Open ID Connect` as the sign on method
9-
3. Enter `Lithnet Access Manager` or another suitable application name and optionally provide a logo
10-
4. For the login redirect URI, enter the base URL where your Lithnet Access Manager app is hosted followed by `/auth/` (eg `https://accessmanager.lithnet.local/auth/`)
11-
5. On the general settings page, click `Edit`
12-
6. Set the logout URL to your base URL, and append `/auth/logout` to the end of it (eg `https://accessmanager.lithnet.local/auth/logout`)
13-
7. Copy the `client ID` and `client secret` value for use later in the setup process
14-
8. Assign the appropriate users to the app
15-
9. Select `Directory` from the main menu bar, and select `Profile editor`. Find the `Lithnet Access Manager` app in the list, and click the `Profile` button
16-
10. Click `Add attribute` and create a new attribute called `upn`, of data type `string`. Select both the `attribute required` and `User personal` check boxes
17-
11. Click the `Map attributes` button. Find the UPN value, and map it to the okta attribute that contains the Active Directory UPN (eg aduser.userPrincipalName)
7+
2. Click `Add application`, then `Create app integration`
8+
3. Select `Open ID Connect` as the sign in method and and `Web application` as the application type
9+
4. Enter `Lithnet Access Manager` or another suitable application name and optionally provide a logo
10+
5. Ensure that `authorization code` is the selected grant type
11+
6. For the sign in redirect URI, enter the base URL where your Lithnet Access Manager app is hosted followed by `/auth/` (eg `https://accessmanager.lithnet.local/auth/`)
12+
7. Set the sign out redirect URI to your base URL, and append `/auth/logout` to the end of it (eg `https://accessmanager.lithnet.local/auth/logout`)
13+
8. Assign the appropriate users to the app and save the new app
14+
9. From the new app page, copy the `client ID` and `client secret` value for use later in the setup process
15+
10. Select `Directory` from the main menu bar, and select `Profile editor`. Find the `Lithnet Access Manager` app in the list, and click the `Profile` button
16+
11. Click `Add attribute` and create a new attribute called `upn`, of data type `string`. Select both the `attribute required` and `User personal` check boxes
17+
12. Click the `Mappings` button. Find the UPN value, and map it to the okta attribute that contains the Active Directory UPN (eg aduser.userPrincipalName)
1818

1919
## Configure Lithnet Access Manager
2020
1. Open the Lithnet Access Manager Service configuration tool
@@ -25,4 +25,4 @@ The following guide will assist you in configuring your application to use Okta
2525
<img src="../images/ui-page-authentication-oidc.png" alt=! width="1000px">
2626

2727
## Enable multi-factor authentication
28-
We strongly recommend to modify your application sign-on policy to require multi-factor authentication for the use of this app.
28+
We strongly recommend to modify your application sign-on policy to require multi-factor authentication for the use of this app.

0 commit comments

Comments
 (0)