Setting up authentication with Okta
The following guide will assist you in configuring your application to use Okta for authentication.
Configure a new application in Okta
Log into the Okta admin console with administrative credentials, select
ApplicationsthenApplicationsClick
Create app integrationSelect
Open ID Connectas the sign in method andWeb applicationas the application typeEnter
Lithnet Access Manageror another suitable application name and optionally provide a logoEnsure that
authorization codeis the selected grant typeFor the
sign in redirect URI, enter the base URL where your Lithnet Access Manager app is hosted followed by/auth/(e.g.https://accessmanager.lithnet.local/auth/)Set the
sign-out redirect URIto your base URL, and append/auth/logoutto the end of it (e.g.https://accessmanager.lithnet.local/auth/logout)Assign the appropriate users to the app and save the new app
From the new app page, copy the
client IDandclient secretvalue for use later in the setup processSelect
Directoryfrom the main menu bar, and selectProfile editor. Find theLithnet Access Managerapp in the list, and click the app name to open the profile editor.Click
Add attributeand create a new attribute with a display name and variable name ofupn, of data typestring. Selectattribute requiredand selectpersonalas the attribute type. Save the new attributeClick the
Mappingsbutton. Scroll down until you fine theupnattribute in the right hand app attributes column, and on the left side, select the Okta attribute that contains the Active Directory UPN (e.g. aduser.userPrincipalName). Change the arrow toApply mapping on user create and update
Configure Lithnet Access Manager
Open the Lithnet Access Manager Service Configuration Tool
Select the
App configuration\User AuthenticationpageSelect
Open ID Connectas the authentication providerEnter the URL of your Okta tenant in the
Issuer/AuthorityfieldEnter the client ID and secret obtained from the Okta setup process

Enable multifactor authentication
We strongly recommend modifying your application sign-on policy to require multifactor authentication for the use of this app.
Alternative claim mapping
AMS maps upn, sid and onprem_sid claims automatically if they are found in the response from the IDP.
If you need to use an attribute other than those, you can configure a custom claim mapping using PowerShell
Last updated
Was this helpful?