Okta
For any new Okta instance in Zilla, we recommend using Client Credential flow mentioned in this document below.
For Authorization Grant Flow, please visit this page.
Configure app integration in Okta
For supporting Client Credential-based authentication we need to create service account in okta.
Please follow the below steps to create service account.
Login to okta with admin credentials.
On left menu, click on Applications → Navigate to Applications in sub-menu -> click on Create App Integration
Select API Services, then click on
Next.
Give name for the App integration name and click on
Save.
In General tab, click on
Editfor Client Credentials section.
Select
Public key / Private keyfor Client authentication field.
Click on the
Add keyinside the PUBLIC KEYS section.To Configure the public key in Okta service application
Option 1: To use Zilla-generated public key (Not recommended)
Paste a public key provided by Zilla and click on Done. Then click on Save to save the changes in Client Credentials section.
Option 2: To use Okta-generated public key (This is the recommended option)
Click on Generate new key .
In “Private key - Copy this!“ section, click on PEM, click on “Copy to clipboard” to copy the private key in PEM format, then click on Done. (This will be visible only once, so store it in a secure place for further use in Zilla configurations). Then click on Save to save the changes in Client Credentials section.
This pop-up will appear, click on Save.
In General tab, for General Settings section, click on
Edit.For Proof of possession field, Uncheck the checkbox of “Require Demonstrating Proof of Possession (DPoP) header in the token requests” and click on
Save.Go to Okta API Scopes tab and grant below mentioned scopes required for API integration, by clicking on “Grant” in Actions column.
okta.apps.readokta.factors.readokta.groups.readokta.policies.readokta.roles.readokta.users.read
Then click on “Granted” in left menu to check the Granted scopes.
Note: manage scopes are only required when ‘enable account modifications’ is set.
Go to Admin roles tab and Click on
Edit assignments, click on Roles dropdown and search and select “Super Administrator”, then click onSave Changes. Reference to this Okta’s documentation discussing how service app constrained with permitted scopes even with admin roles.
If Option 2 is chosen for configuring Public Key in Okta service application in Step 8. above, then Copy Client Id, Client Domain and Private key for configuring & syncing Okta in Zilla.
If Option 1 is chosen for configuring Public Key in Okta service application in Step 8. above, then Copy Client Id, Client Domain for configuring & syncing Okta in Zilla.
Setup Okta Application API Integration on Zilla
Visit the Zilla application and login using your admin credentials and then click on
Add Applicationin the top right.
A window with a search bar appears, type in
oktain the search bar and hit enter.Oktaapp entry will appear at the top of the list, clickAdd to Applicationsbutton to the right.
Fill in the form with appropriate details and then click
Add to Applications.
The
Oktaapp will be added to the Applications tab. Click onOktain Application column.
A detailed view of
Oktaapplication appears. ClickSync nowin top right corner.
Enable API Integration. Enter the
Okta Domain,Okta Client Idinto the respective text fields.In
Use client credential based authentication (Yes/No)field, enter “Yes” as value (For client credential flow)Click on
Sync Now/Nextwithout adding any private key in the case of Option 1: Zilla-generated public keyAdd the Private key to the field named
Private key of the service account (Required for client credential based authentication)copied in the above steps and clickSync Now/Nextin the case of Option 2: Okta-generated public keyIf the
Sync roles assigned to applications?setting is set to Yes, Zilla will be able to identify applications with specific roles (in addition to scopes) and display them as accounts in Accounts tab in Okta application instance with the assigned roles and as resources in Resources tab.
If set to No, these applications will be shown as resources in Resources tab in Zilla for Okta application instance.
Click
Nextagain and the sync will begin. Then clickDone.
Successful sync will pop up with Sync Summary. Click
Close.