For any new Okta instance in Zilla, we recommend using Client Credential flow mentioned in this document below. For Authorization Grant Flow, please visit this page. |
For supporting Client Credential-based authentication we need to create service account in okta.
Please follow the below steps to create service account.
Login to okta with admin credentials.
On left menu, click on Applications → Navigate to Applications in sub-menu -> click on Create App Integration
Select API Services, then click on Next
.
Give name for the App integration name and click on Save
.
In General tab, click on Edit
for Client Credentials section.
Select Public key / Private key
for Client authentication field.
Click on the Add key
inside the PUBLIC KEYS section.
To Configure the public key in Okta service application
Option 1: To use Zilla-generated public key (Not recommended)
Paste a public key provided by Zilla and click on Done
. Then click on Save
to save the changes in Client Credentials section.
Option 2: To use Okta-generated public key (This is the recommended option)
Click on Generate new key
.
In “Private key - Copy this!“ section, click on PEM, click on “Copy to clipboard” to copy the private key in PEM format, then click on Done
. (This will be visible only once, so store it in a secure place for further use in Zilla configurations). Then click on Save
to save the changes in Client Credentials section.
This pop-up will appear, click on Save
.
In General tab, for General Settings section, click on Edit
.
For Proof of possession field, Uncheck the checkbox of “Require Demonstrating Proof of Possession (DPoP) header in the token requests” and click on Save
.
Go to Okta API Scopes tab and grant below mentioned scopes required for API integration, by clicking on “Grant” in Actions column. okta.apps.read
okta.factors.read
okta.groups.read
okta.policies.read
okta.roles.read
okta.users.read
Then click on “Granted” in left menu to check the Granted scopes.
Note: manage scopes are only required when ‘enable account modifications’ is set. |
Go to Admin roles tab and Click on Edit assignments
, click on Roles dropdown and search and select “Super Administrator”, then click on Save Changes
. Reference to this Okta’s documentation discussing how service app constrained with permitted scopes even with admin roles.
If Option 2 is chosen for configuring Public Key in Okta service application in Step 8. above, then Copy Client Id, Client Domain and Private key for configuring & syncing Okta in Zilla.
If Option 1 is chosen for configuring Public Key in Okta service application in Step 8. above, then Copy Client Id, Client Domain for configuring & syncing Okta in Zilla.
Visit the Zilla application and login using your admin credentials and then click on Add Application
in the top right.
A window with a search bar appears, type in okta
in the search bar and hit enter. Okta
app entry will appear at the top of the list, click Add to Applications
button to the right.
Fill in the form with appropriate details and then click Add to Applications
.
The Okta
app will be added to the Applications tab. Click on Okta
in Application column.
A detailed view of Okta
application appears. Click Sync now
in top right corner.
Enable API Integration. Enter the Okta Domain
, Okta Client Id
into the respective text fields.
In Use client credential based authentication (Yes/No)
field, enter “Yes” as value (For client credential flow)
Click on Sync Now
/Next
without adding any private key in the case of Option 1: Zilla-generated public key
Add the Private key to the field named Private key of the service account (Required for client credential based authentication)
copied in the above steps and click Sync Now
/Next
in the case of Option 2: Okta-generated public key
If the Sync roles assigned to applications?
setting is set to Yes, Zilla will be able to identify applications with specific roles (in addition to scopes) and display them as accounts in Accounts tab in Okta application instance with the assigned roles and as resources in Resources tab.
If set to No, these applications will be shown as resources in Resources tab in Zilla for Okta application instance.
Click Next
again and the sync will begin. Then click Done
.
Successful sync will pop up with Sync Summary. Click Close
.