Setting up authentication with Okta
The following guide will assist you in configuring your application to use Okta for authentication.
Configure a new application in Okta
Log into the Okta admin console with administrative credentials, select
Applications
thenApplications
Click
Create app integration
Select
Open ID Connect
as the sign in method andWeb application
as the application typeEnter
Lithnet Access Manager
or another suitable application name and optionally provide a logoEnsure that
authorization code
is the selected grant typeFor the
sign in redirect URI
, enter the base URL where your Lithnet Access Manager app is hosted followed by/auth/
(e.g.https://accessmanager.lithnet.local/auth/
)Set the
sign-out redirect URI
to your base URL, and append/auth/logout
to the end of it (e.g.https://accessmanager.lithnet.local/auth/logout
)Assign the appropriate users to the app and save the new app
From the new app page, copy the
client ID
andclient secret
value for use later in the setup processSelect
Directory
from the main menu bar, and selectProfile editor
. Find theLithnet Access Manager
app in the list, and click the app name to open the profile editor.Click
Add attribute
and create a new attribute with a display name and variable name ofupn
, of data typestring
. Selectattribute required
and selectpersonal
as the attribute type. Save the new attributeClick the
Mappings
button. Scroll down until you fine theupn
attribute in the right hand app attributes column, and on the left side, select the Okta attribute that contains the Active Directory UPN (e.g. aduser.userPrincipalName). Change the arrow toApply mapping on user create and update
Configure Lithnet Access Manager
Open the Lithnet Access Manager Service Configuration Tool
Select the
App configuration\User Authentication
pageSelect
Open ID Connect
as the authentication providerEnter the URL of your Okta tenant in the
Issuer/Authority
fieldEnter the client ID and secret obtained from the Okta setup process
Enable multifactor authentication
We strongly recommend modifying your application sign-on policy to require multifactor authentication for the use of this app.
Alternative claim mapping
AMS maps upn
, sid
and onprem_sid
claims automatically if they are found in the response from the IDP.
If you need to use an attribute other than those, you can configure a custom claim mapping using PowerShell
Last updated